General

  • Target

    3138a402a7df1d48dc76c42db50761e2d80c1d2925cbb9279fa5d01f835aa04b

  • Size

    155KB

  • Sample

    220620-3zqb1sdhdk

  • MD5

    8ca0133cfea932a7a181c23353628f3f

  • SHA1

    c7111e2f7cc67dcdd5d18bdde76476b681cfc18a

  • SHA256

    3138a402a7df1d48dc76c42db50761e2d80c1d2925cbb9279fa5d01f835aa04b

  • SHA512

    485023c4b67864458e4ee94d06083bb68f1856aed463f590a25bfabca614379ecad9b558ba3a8695c8d9192966fc64de9afdca9e49e67ad77a32646391c22186

Malware Config

Targets

    • Target

      3138a402a7df1d48dc76c42db50761e2d80c1d2925cbb9279fa5d01f835aa04b

    • Size

      155KB

    • MD5

      8ca0133cfea932a7a181c23353628f3f

    • SHA1

      c7111e2f7cc67dcdd5d18bdde76476b681cfc18a

    • SHA256

      3138a402a7df1d48dc76c42db50761e2d80c1d2925cbb9279fa5d01f835aa04b

    • SHA512

      485023c4b67864458e4ee94d06083bb68f1856aed463f590a25bfabca614379ecad9b558ba3a8695c8d9192966fc64de9afdca9e49e67ad77a32646391c22186

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks