General

  • Target

    0dfff5bbf6b08a68798117e7f9126d0fd9715dc6cd2b40a4e027d54f911ad0aa.exe

  • Size

    203KB

  • Sample

    220521-yhzrxadae2

  • MD5

    2b7214d5daad8b850451b3b9f18aec65

  • SHA1

    b77414da73fe96f7c899c4d1cf39e71803083d06

  • SHA256

    0dfff5bbf6b08a68798117e7f9126d0fd9715dc6cd2b40a4e027d54f911ad0aa

  • SHA512

    50a67c167078137d7b5a2ca04771cd095ed36f4eef70e62435a3aa02bcac3dee39a86c3f28e2087c1dcbd37d1553896d52d4668701b7c569bd65d942c287be66

Malware Config

Extracted

Family

pony

C2

http://abcmedicalcenter.ro/masivcas/gate.php

Targets

    • Target

      0dfff5bbf6b08a68798117e7f9126d0fd9715dc6cd2b40a4e027d54f911ad0aa.exe

    • Size

      203KB

    • MD5

      2b7214d5daad8b850451b3b9f18aec65

    • SHA1

      b77414da73fe96f7c899c4d1cf39e71803083d06

    • SHA256

      0dfff5bbf6b08a68798117e7f9126d0fd9715dc6cd2b40a4e027d54f911ad0aa

    • SHA512

      50a67c167078137d7b5a2ca04771cd095ed36f4eef70e62435a3aa02bcac3dee39a86c3f28e2087c1dcbd37d1553896d52d4668701b7c569bd65d942c287be66

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Looks for VirtualBox Guest Additions in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Collection

Email Collection

2
T1114

Data from Local System

1
T1005

Tasks