General

  • Target

    2cb2bb51e0b31a2d65801e4af3776c28202a08fe035e56129b17bcd758e368f8

  • Size

    155KB

  • Sample

    221003-cyhmnscce4

  • MD5

    990ea3f8914bdf9dd6440aa32e12ffc2

  • SHA1

    06da5bce71c3d6d0d2ebe673cddd9f48f66ec7cc

  • SHA256

    2cb2bb51e0b31a2d65801e4af3776c28202a08fe035e56129b17bcd758e368f8

  • SHA512

    5a9c451fe4650b7109fa11a3c69afcb0d987a91e901e44a8cd251f889fd06240053e1f9f0d894d38bf5575ef9c35f3a29d501813cde84493636c8c664072250b

  • SSDEEP

    3072:MOCSgal/jOxAk31p1k8oLM9HXmRb+tSi+GqDCZ1Ax6t/gQJ:6Yu+LDnx5Q

Malware Config

Extracted

Family

pony

C2

http://www.rays-auto-parts.com/oak/gate.php

Attributes
  • payload_url

    http://www.rays-auto-parts.com/oak/shit.exe

Targets

    • Target

      2cb2bb51e0b31a2d65801e4af3776c28202a08fe035e56129b17bcd758e368f8

    • Size

      155KB

    • MD5

      990ea3f8914bdf9dd6440aa32e12ffc2

    • SHA1

      06da5bce71c3d6d0d2ebe673cddd9f48f66ec7cc

    • SHA256

      2cb2bb51e0b31a2d65801e4af3776c28202a08fe035e56129b17bcd758e368f8

    • SHA512

      5a9c451fe4650b7109fa11a3c69afcb0d987a91e901e44a8cd251f889fd06240053e1f9f0d894d38bf5575ef9c35f3a29d501813cde84493636c8c664072250b

    • SSDEEP

      3072:MOCSgal/jOxAk31p1k8oLM9HXmRb+tSi+GqDCZ1Ax6t/gQJ:6Yu+LDnx5Q

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks