General

  • Target

    677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d

  • Size

    533KB

  • Sample

    221124-qw645sgb67

  • MD5

    6c93cfb0c4823968a3fd3ede4848f970

  • SHA1

    54670a7dcfddf0199bc67dde3712fd3f5b9c7833

  • SHA256

    677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d

  • SHA512

    bd1300377f0c13b813aa1af65fd0c789ea1573666906e58ece249e99cda583b4e5ec87cdd2a813c29ed44a23be843929dca84a771b8895ff6c16c517ff55a04f

  • SSDEEP

    12288:c4SWWcfrX7EDbvULAohIlshTYboOmpyGxANG0rH+82wqpbxN:9S7cf0vUL3OlsJBECANnrwpbxN

Malware Config

Extracted

Family

pony

C2

http://coco-bomgo.ru/wp-content/themes/twentytwelve/admin1/php/gate.php

Targets

    • Target

      677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d

    • Size

      533KB

    • MD5

      6c93cfb0c4823968a3fd3ede4848f970

    • SHA1

      54670a7dcfddf0199bc67dde3712fd3f5b9c7833

    • SHA256

      677a5f11a695b1050ea2c27544e8dcbef3aeef5f1f5bf9b018ceb1d03a1fd40d

    • SHA512

      bd1300377f0c13b813aa1af65fd0c789ea1573666906e58ece249e99cda583b4e5ec87cdd2a813c29ed44a23be843929dca84a771b8895ff6c16c517ff55a04f

    • SSDEEP

      12288:c4SWWcfrX7EDbvULAohIlshTYboOmpyGxANG0rH+82wqpbxN:9S7cf0vUL3OlsJBECANnrwpbxN

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks