General

  • Target

    03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d

  • Size

    132KB

  • Sample

    221011-ere93sdgg9

  • MD5

    6c18d4e68f9374438bb9592f27346884

  • SHA1

    66c42558adc5ac242c6d953796855ce180736cbd

  • SHA256

    03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d

  • SHA512

    3d40d2a7068cf85a32bc89e04cb08be1cfada9b961d86a3a66fde4a53430739c30981a6d03e1cc0dfa9fb9e934c131a4c942bbfe025474247072f4f788aaef67

  • SSDEEP

    3072:vlM4F79IBmU4NlwU5QYee9N0jBBi+uIY/qWaWQ8outjxxxxxx0HH0xxxVgLLxx1Z:31pqkee92jBBiAY/qW3HoSjxxxxxx0Hj

Malware Config

Targets

    • Target

      03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d

    • Size

      132KB

    • MD5

      6c18d4e68f9374438bb9592f27346884

    • SHA1

      66c42558adc5ac242c6d953796855ce180736cbd

    • SHA256

      03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d

    • SHA512

      3d40d2a7068cf85a32bc89e04cb08be1cfada9b961d86a3a66fde4a53430739c30981a6d03e1cc0dfa9fb9e934c131a4c942bbfe025474247072f4f788aaef67

    • SSDEEP

      3072:vlM4F79IBmU4NlwU5QYee9N0jBBi+uIY/qWaWQ8outjxxxxxx0HH0xxxVgLLxx1Z:31pqkee92jBBiAY/qW3HoSjxxxxxx0Hj

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks