General

  • Target

    9a18e6f7d3e69b690b41467454436e463ca1c291583b0cccafc8945514133482

  • Size

    68KB

  • Sample

    221125-3pfptsac81

  • MD5

    88760e1b0898f8ac237cf8484efd4aba

  • SHA1

    82232e4c05a1698b1c35ed630abf01091daa9185

  • SHA256

    9a18e6f7d3e69b690b41467454436e463ca1c291583b0cccafc8945514133482

  • SHA512

    f4e028241a5e51b1ea24b14c476c059828c36d49421b4cefdb04a8efe7b3f1eeffd4c366bfe206d056910971d47c216ef3fd603dc2b17d8d4ea18ca41ac490af

  • SSDEEP

    1536:bgL14FICJrsEj+05qFs5Xg8ao0lDuxo9UUNS9C4FARedeRbOgC:i1wIC95qS5QwgDIo9dNIGRCeRxC

Malware Config

Extracted

Family

pony

C2

http://65.75.137.237/gate.php

http://65.75.138.212/gate.php

http://65.75.139.225/gate.php

http://65.75.140.218/gate.php

http://65.75.141.214/gate.php

http://65.75.142.202/gate.php

http://65.75.143.189/gate.php

http://65.75.144.219/gate.php

http://65.75.145.215/gate.php

http://65.75.146.203/gate.php

http://65.75.147.203/gate.php

http://65.75.148.198/gate.php

http://65.75.149.202/gate.php

http://simple-cdn-node.com/gate.php

Attributes
  • payload_url

    http://first-cdn-node.com/1.exe

    http://first-cdn-node.com/6.exe

Targets

    • Target

      9a18e6f7d3e69b690b41467454436e463ca1c291583b0cccafc8945514133482

    • Size

      68KB

    • MD5

      88760e1b0898f8ac237cf8484efd4aba

    • SHA1

      82232e4c05a1698b1c35ed630abf01091daa9185

    • SHA256

      9a18e6f7d3e69b690b41467454436e463ca1c291583b0cccafc8945514133482

    • SHA512

      f4e028241a5e51b1ea24b14c476c059828c36d49421b4cefdb04a8efe7b3f1eeffd4c366bfe206d056910971d47c216ef3fd603dc2b17d8d4ea18ca41ac490af

    • SSDEEP

      1536:bgL14FICJrsEj+05qFs5Xg8ao0lDuxo9UUNS9C4FARedeRbOgC:i1wIC95qS5QwgDIo9dNIGRCeRxC

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks