General

  • Target

    d48df4bef4c0ec7131525eeed479077257784579702a7f624500063494e42c4b

  • Size

    183KB

  • Sample

    221120-a568hahe34

  • MD5

    4629a8c93ede0b9b1cbdefedd48a2cc0

  • SHA1

    5c2e301cfc7e23c828ae0bcd54dbd1fcfa1d88f9

  • SHA256

    d48df4bef4c0ec7131525eeed479077257784579702a7f624500063494e42c4b

  • SHA512

    09ed0813373a1bbdf2401afd21d91c48737155d480ab2c8dc74effd814a2311530c7c9239c8deee09c3e83bed0573d322d96a6421470a78cc1561a7d3ab736dc

  • SSDEEP

    3072:aOeWvTmDM7wW4ssl+YK4eVgWMvlQaNlu2WXuku8ukggw:aOnmAB4B3l4ClQ6u2WXuku8ukrw

Malware Config

Extracted

Family

pony

C2

http://sonrepkewa.com/gate.php

http://andwronughwith.ru/gate.php

http://saningkedhanrigh.ru/gate.php

Attributes
  • payload_url

    http://teledirect.com.sg/wp-content/plugins/cached_data/k1.exe

    http://www.orlandinifirenze.com/wp-content/plugins/cached_data/k1.exe

    http://www.smartag.my/wp-content/plugins/cached_data/k1.exe

Targets

    • Target

      d48df4bef4c0ec7131525eeed479077257784579702a7f624500063494e42c4b

    • Size

      183KB

    • MD5

      4629a8c93ede0b9b1cbdefedd48a2cc0

    • SHA1

      5c2e301cfc7e23c828ae0bcd54dbd1fcfa1d88f9

    • SHA256

      d48df4bef4c0ec7131525eeed479077257784579702a7f624500063494e42c4b

    • SHA512

      09ed0813373a1bbdf2401afd21d91c48737155d480ab2c8dc74effd814a2311530c7c9239c8deee09c3e83bed0573d322d96a6421470a78cc1561a7d3ab736dc

    • SSDEEP

      3072:aOeWvTmDM7wW4ssl+YK4eVgWMvlQaNlu2WXuku8ukggw:aOnmAB4B3l4ClQ6u2WXuku8ukrw

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks