General

  • Target

    9d25b0749d2105e5da7552c5bdc98664f69604e0e17eaf259673aded03d40680

  • Size

    88KB

  • Sample

    221002-2xj7jsecf6

  • MD5

    66130161c3e9dfb1cd6f5ce0065c4bc8

  • SHA1

    18c4093b84c077f8930c6091237749e5c18dd0b1

  • SHA256

    9d25b0749d2105e5da7552c5bdc98664f69604e0e17eaf259673aded03d40680

  • SHA512

    4ba68b506e898df5fd91c6920323107d98472d8ce96cb6261cc4d97e99c62e3ab90843988af025bb1101f272c276a9dd6f7d99a7d2a87c35dcd47148b44e44e3

  • SSDEEP

    1536:x3V3e8KytqTZkYu5SCvaDBzgM+5zu9kS24zxAkOg8WTvMEIekzZ3:9dOy+ubiDBzv+1H4OgYEIR3

Malware Config

Extracted

Family

pony

C2

http://shivamauxichem.com/default.php?yTfVhmjTXLm3HjnxhAfOkiU3Qp9SdC6JL

http://inglesamericano.edu.gt/default.php?x7z5cFlYMS5Jxxrijlf4OwAzAutD7

http://frederickscottarcher.com/default.php?kgKoqcurdpQWAfo5IqowU7y2tiB

http://artdeciel.com/default.php?uE2HN31OsigbCP7qD8uAqU8f4vXgCS8Cheh8LL

http://tastefulspace.com/default.php?XwE3Vu15haKu28EwKMaPqgtX6jJv2KVRdK

Targets

    • Target

      9d25b0749d2105e5da7552c5bdc98664f69604e0e17eaf259673aded03d40680

    • Size

      88KB

    • MD5

      66130161c3e9dfb1cd6f5ce0065c4bc8

    • SHA1

      18c4093b84c077f8930c6091237749e5c18dd0b1

    • SHA256

      9d25b0749d2105e5da7552c5bdc98664f69604e0e17eaf259673aded03d40680

    • SHA512

      4ba68b506e898df5fd91c6920323107d98472d8ce96cb6261cc4d97e99c62e3ab90843988af025bb1101f272c276a9dd6f7d99a7d2a87c35dcd47148b44e44e3

    • SSDEEP

      1536:x3V3e8KytqTZkYu5SCvaDBzgM+5zu9kS24zxAkOg8WTvMEIekzZ3:9dOy+ubiDBzv+1H4OgYEIR3

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks