General

  • Target

    e100c471df9e3c5e5d3d5e33dd37feb6952b9ad2c5d181f31ba19fac6af65a41

  • Size

    70KB

  • Sample

    221123-s4vgesga9v

  • MD5

    5b04358d8f484b095d789334f7cf62b8

  • SHA1

    301af387e80aba2dd8f289b5814ed890ecfe65c7

  • SHA256

    e100c471df9e3c5e5d3d5e33dd37feb6952b9ad2c5d181f31ba19fac6af65a41

  • SHA512

    364ad5ef5ea8625640cbe87efd6995cd3c4c91549d8373b4db4209cc77a92a2d34fe1bd356fbf0046a908855c4ccc144c907a06f3eb69fce2cc2dd126bc4420e

  • SSDEEP

    1536:b2eOHPWqI3Bifk82+2V5HEo8aaEkbstATh8FcbKvxBnEP7Md:DOer3Bifk/+WHovExCRaxBE+

Malware Config

Extracted

Family

pony

C2

http://sekkyspamz.favcc1.com/gate.php

Attributes
  • payload_url

    http://sekkyspamz.favcc1.com/shit.exe

Targets

    • Target

      DOC329993903-PDF.exe

    • Size

      147KB

    • MD5

      630e8d3ba621596560ffbf0633102ba7

    • SHA1

      62bb6d36401bf215028ddefb80a10f9f1a102957

    • SHA256

      67cf9d92ba34b560f348146c8e05729f00d55468ce6c97910f59b246054cf47e

    • SHA512

      663cb02e63facd7e417f218bb12bb0988768f2418c22736ae4b41b591a6828dc695c8f4b880bd3c9f240e05bd5feddf980dd2e1825e2352f403cf1147fea7015

    • SSDEEP

      3072:IB7bgimU4VStD9gysbJLulP8R7fzKyjCmBcvSCOBMzkvgoYku22O:Ef4PbJqkR7f5SSpKo1vb

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks