General

  • Target

    117AE3B6D9239584DA7887DB5DAEE6C240E9E58D2B4F6.exe

  • Size

    368KB

  • Sample

    210704-mq1nfhzqas

  • MD5

    2602dbc2fec124c5daf408ca67734a74

  • SHA1

    a99f4a74be8d77dfd5f46309e42009d86865577e

  • SHA256

    117ae3b6d9239584da7887db5daee6c240e9e58d2b4f6bcafa9b1a5ef4194d20

  • SHA512

    2a46e635489c13959d850be781f9faed56432ab7042dab63f797c19788d050dc3e892182a2edb101000262510289d1629d1c8c5eabf36b0eecb53b3577c3bfa0

Malware Config

Extracted

Family

pony

C2

http://insignia.co.mw/boc/panel/gate.php

Attributes
  • payload_url

    http://insignia.co.mw/boc/panel/boc.exe

Targets

    • Target

      117AE3B6D9239584DA7887DB5DAEE6C240E9E58D2B4F6.exe

    • Size

      368KB

    • MD5

      2602dbc2fec124c5daf408ca67734a74

    • SHA1

      a99f4a74be8d77dfd5f46309e42009d86865577e

    • SHA256

      117ae3b6d9239584da7887db5daee6c240e9e58d2b4f6bcafa9b1a5ef4194d20

    • SHA512

      2a46e635489c13959d850be781f9faed56432ab7042dab63f797c19788d050dc3e892182a2edb101000262510289d1629d1c8c5eabf36b0eecb53b3577c3bfa0

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks