General

  • Target

    57337955887a125b2a49f977d24b1262392be350ca0184c7d41a32ddd2749e88

  • Size

    696KB

  • Sample

    221125-bprnjseh8x

  • MD5

    c14f400ccda61064479c9f63508fc71f

  • SHA1

    408557b17a83556deb135bc914fab80e752eb037

  • SHA256

    57337955887a125b2a49f977d24b1262392be350ca0184c7d41a32ddd2749e88

  • SHA512

    56634de23cd874d2d85f1cdf4687b4251685182e07b92944877a280b8af6cc0cb7ddbd6e7b2ed7af1e99bb0890f4c39a7358adfd25fb8daf2986b68cb94b517d

  • SSDEEP

    6144:t7L4a8T72fxq6bz2Twtwc6fPomgIpqN4Cclavp/KpE/MPo:t7L4aeGq6bqTwWoB0HvlMQSMo

Malware Config

Extracted

Family

pony

C2

http://ego.fav.cc/gate.php

Attributes
  • payload_url

    http://ego.fav.cc/shit.exe

Targets

    • Target

      57337955887a125b2a49f977d24b1262392be350ca0184c7d41a32ddd2749e88

    • Size

      696KB

    • MD5

      c14f400ccda61064479c9f63508fc71f

    • SHA1

      408557b17a83556deb135bc914fab80e752eb037

    • SHA256

      57337955887a125b2a49f977d24b1262392be350ca0184c7d41a32ddd2749e88

    • SHA512

      56634de23cd874d2d85f1cdf4687b4251685182e07b92944877a280b8af6cc0cb7ddbd6e7b2ed7af1e99bb0890f4c39a7358adfd25fb8daf2986b68cb94b517d

    • SSDEEP

      6144:t7L4a8T72fxq6bz2Twtwc6fPomgIpqN4Cclavp/KpE/MPo:t7L4aeGq6bqTwWoB0HvlMQSMo

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks