General

  • Target

    38dfeabf5526511effa346e9ced2145d4d2b1ffbc065146d3869e27fc235cd99.exe

  • Size

    698KB

  • Sample

    220521-yhyvlsgbhr

  • MD5

    0937ad49912c231a7b996268a685a5a3

  • SHA1

    4d9abdc517ecdb57cd259f0e9cd64a8090a4ba44

  • SHA256

    38dfeabf5526511effa346e9ced2145d4d2b1ffbc065146d3869e27fc235cd99

  • SHA512

    ee1cef0019199cd41a5e2b3ff875be719355caf6d93aca29d8184135978f47dde561c39206858097b8e8ef57eeb946ec620312fb14cbc4c9664c7330304d114d

Malware Config

Extracted

Family

pony

C2

http://lasgidivibescontrol.com/onyyy/panel/gate.php

Attributes
  • payload_url

    http://lasgidivibescontrol.com/shit.exe

Targets

    • Target

      38dfeabf5526511effa346e9ced2145d4d2b1ffbc065146d3869e27fc235cd99.exe

    • Size

      698KB

    • MD5

      0937ad49912c231a7b996268a685a5a3

    • SHA1

      4d9abdc517ecdb57cd259f0e9cd64a8090a4ba44

    • SHA256

      38dfeabf5526511effa346e9ced2145d4d2b1ffbc065146d3869e27fc235cd99

    • SHA512

      ee1cef0019199cd41a5e2b3ff875be719355caf6d93aca29d8184135978f47dde561c39206858097b8e8ef57eeb946ec620312fb14cbc4c9664c7330304d114d

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Tasks