General

  • Target

    d2038c81cad48cdb36307d56d9962e9ed31ca6b0081ca0144bb9a081d195f094

  • Size

    688KB

  • Sample

    221124-xgws7ace59

  • MD5

    9e0a98915fbf950eb3dbe150fc714359

  • SHA1

    9a4d488b3af31cbcd23d31d24ddc964df470b586

  • SHA256

    d2038c81cad48cdb36307d56d9962e9ed31ca6b0081ca0144bb9a081d195f094

  • SHA512

    a4872de66d0bd3feeb61daf2e426b3b34aae076affb6f68bb168e6b45591513481df48c88b7e65a3bcf5bb4a128d3b9ccefa88ac6840b6c12df80cd56a676759

  • SSDEEP

    6144:WYvQ3CJ0eel1vWjLu7ioQxI3F6GlSkwlS9z6enixH53dybisnrQ2qLfPoYt:ICJ0eU9oLu7ioQxIX4S9+fnAisnrMoU

Malware Config

Extracted

Family

pony

C2

http://al.favcc1.com/gate.php

Attributes
  • payload_url

    http://al.favcc1.com/shit.exe

Targets

    • Target

      d2038c81cad48cdb36307d56d9962e9ed31ca6b0081ca0144bb9a081d195f094

    • Size

      688KB

    • MD5

      9e0a98915fbf950eb3dbe150fc714359

    • SHA1

      9a4d488b3af31cbcd23d31d24ddc964df470b586

    • SHA256

      d2038c81cad48cdb36307d56d9962e9ed31ca6b0081ca0144bb9a081d195f094

    • SHA512

      a4872de66d0bd3feeb61daf2e426b3b34aae076affb6f68bb168e6b45591513481df48c88b7e65a3bcf5bb4a128d3b9ccefa88ac6840b6c12df80cd56a676759

    • SSDEEP

      6144:WYvQ3CJ0eel1vWjLu7ioQxI3F6GlSkwlS9z6enixH53dybisnrQ2qLfPoYt:ICJ0eU9oLu7ioQxIX4S9+fnAisnrMoU

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks