General

  • Target

    afa4d61fcad43a465cbcc774280a78e38ef760934650bac29ecf165f32864ade

  • Size

    81KB

  • Sample

    221125-s1ea2agf32

  • MD5

    6940cf274606676ba1184b97f1c714fd

  • SHA1

    060e68d3ef0cd16d952e9453bad6571572f9c951

  • SHA256

    afa4d61fcad43a465cbcc774280a78e38ef760934650bac29ecf165f32864ade

  • SHA512

    dc3603fb924a599db94061824c35a17fa9dbc600241bcad3c4cb5ce99ddddf39662dd4503f4627718abd17b43061494c482f08ac330fe5cfd85f2b2fd1b82bf6

  • SSDEEP

    1536:yjBtqL9JtblyaTq7n1x1NOtBUMffxkKanouy8oOq9IxL:yjPq7t1TSn31NOtCgfxkKCoutWI

Malware Config

Extracted

Family

pony

C2

http://soulflower.com.mx/ext/see/gate.php

Targets

    • Target

      afa4d61fcad43a465cbcc774280a78e38ef760934650bac29ecf165f32864ade

    • Size

      81KB

    • MD5

      6940cf274606676ba1184b97f1c714fd

    • SHA1

      060e68d3ef0cd16d952e9453bad6571572f9c951

    • SHA256

      afa4d61fcad43a465cbcc774280a78e38ef760934650bac29ecf165f32864ade

    • SHA512

      dc3603fb924a599db94061824c35a17fa9dbc600241bcad3c4cb5ce99ddddf39662dd4503f4627718abd17b43061494c482f08ac330fe5cfd85f2b2fd1b82bf6

    • SSDEEP

      1536:yjBtqL9JtblyaTq7n1x1NOtBUMffxkKanouy8oOq9IxL:yjPq7t1TSn31NOtCgfxkKCoutWI

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks