General

  • Target

    732b32e1f0e76143882a58301717c4fde1034ceb60e1ee2ec9849167db255f99

  • Size

    130KB

  • Sample

    221125-qa1p8sdc2v

  • MD5

    3b5c315f034aeac4b2a4dfeaec0c03ae

  • SHA1

    2350d8403ffa404f6e9ca701ec1790efa7b85259

  • SHA256

    732b32e1f0e76143882a58301717c4fde1034ceb60e1ee2ec9849167db255f99

  • SHA512

    d5c6e22ce643f83d5ece2464380869a30ec736081d5f0eee643a61b0af1a515fce5480c80ec94625839bb296762cb9d4b1b06008182320b5ab3a68f76f1cce5c

  • SSDEEP

    3072:sr85CXEl+OVaEaSrCaZMFX3MClrUR9cY+:k99OLCaZOX8e9P

Malware Config

Extracted

Family

pony

C2

http://fb3752ud.bget.ru/gate.php

Targets

    • Target

      732b32e1f0e76143882a58301717c4fde1034ceb60e1ee2ec9849167db255f99

    • Size

      130KB

    • MD5

      3b5c315f034aeac4b2a4dfeaec0c03ae

    • SHA1

      2350d8403ffa404f6e9ca701ec1790efa7b85259

    • SHA256

      732b32e1f0e76143882a58301717c4fde1034ceb60e1ee2ec9849167db255f99

    • SHA512

      d5c6e22ce643f83d5ece2464380869a30ec736081d5f0eee643a61b0af1a515fce5480c80ec94625839bb296762cb9d4b1b06008182320b5ab3a68f76f1cce5c

    • SSDEEP

      3072:sr85CXEl+OVaEaSrCaZMFX3MClrUR9cY+:k99OLCaZOX8e9P

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks