General

  • Target

    8feae03951203fbfdf623c8dfadad2cdc10560bc11e28c1fc134492a764833a6.exe

  • Size

    88KB

  • Sample

    220521-yhz3nsdae6

  • MD5

    2cf2d385af6389247d32e3aec67a8a30

  • SHA1

    2ed7b01c1ae88d9c64fa283611fb80f5a48310cd

  • SHA256

    8feae03951203fbfdf623c8dfadad2cdc10560bc11e28c1fc134492a764833a6

  • SHA512

    2f954e4b1a27a4877532602d792490c48c22bb66be3f680beffab26db3302fb299414c41ef5d7ec87e7502f5ef4e51e0b97cb71c397f53bc4b0b712f8b5035ed

Malware Config

Extracted

Family

pony

C2

http://comune.fuscaldo.cs.it/default.php?p9wsXpAvDfbJSwcgH5xNVQu9faQpYD

http://poppahomes.com/default.php?8JLNpZbvuUKkijOwYST5FfS36U3sc8oArUe9s

http://illinoisrates.com/default.php?FqrCYZSSXh1rcfqoAUw3BdWUFtgriLeoqa

http://waldenserhof-springpferde.de/default.php?DerBMUuhfjqhncHNeqAexgF

http://endless.svdownloadurl.com/default.php?SSE3dnJGqh6D4aKuszmV8xkS7C

Targets

    • Target

      8feae03951203fbfdf623c8dfadad2cdc10560bc11e28c1fc134492a764833a6.exe

    • Size

      88KB

    • MD5

      2cf2d385af6389247d32e3aec67a8a30

    • SHA1

      2ed7b01c1ae88d9c64fa283611fb80f5a48310cd

    • SHA256

      8feae03951203fbfdf623c8dfadad2cdc10560bc11e28c1fc134492a764833a6

    • SHA512

      2f954e4b1a27a4877532602d792490c48c22bb66be3f680beffab26db3302fb299414c41ef5d7ec87e7502f5ef4e51e0b97cb71c397f53bc4b0b712f8b5035ed

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • suricata: ET MALWARE Fareit/Pony Downloader Checkin 2

      suricata: ET MALWARE Fareit/Pony Downloader Checkin 2

    • suricata: ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98

      suricata: ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98

    • suricata: ET MALWARE Win32.Fareit.A/Pony Downloader Checkin

      suricata: ET MALWARE Win32.Fareit.A/Pony Downloader Checkin

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks