General

  • Target

    dd7c054e96f61730670964c414e0e07fee8d1c44564ff183136c6272bdb27ec0

  • Size

    131KB

  • Sample

    221126-eq23fsba94

  • MD5

    0b42af1852f7f082ec63617d9a39eac9

  • SHA1

    7f29ae89ca3e1a6de9ef326eec49e7d119fbaa13

  • SHA256

    dd7c054e96f61730670964c414e0e07fee8d1c44564ff183136c6272bdb27ec0

  • SHA512

    673eb35c6494c372ccff4eefbc4b62e37b4c83905584913d4524e766abe39c167e93a4e066d609ba6efea360cdda6181ae32b15ed7d8051cc3a9b73ab90c6a8e

  • SSDEEP

    3072:7qu3HSWaxXpX0wWd2QDyIlBnU1DDe0ZSqMud6mq:7pXdY0ld2odUdK3huFq

Malware Config

Extracted

Family

pony

C2

http://zurekconstruction.com/wp-content/themes/twentythirteen/redirect.php

http://4dpotolki.ru/wp-content/index.php

http://formevip.ru/wp-content/plugins/buddypress/redirect.php

http://my-suba.ru/kernel/includes/redirect.php

http://doc-plastic.ru/pages/gate.php

http://yura.pudul.ru/plyushka/sites/default/redirect.php

http://avrorarealty.com/modules/living/gate.php

http://uk-legal.com.ua/modules/content/test.php

http://aisrf.ru/images/011014.jpg

http://zblog.at.ua/images/011014.dat

http://4dpotolki.ru/wp-content/upgrade/011014.dat

http://all-cs.moy.su/prin/011014.dat

http://auto-billiard.ru/data/PRCENTERAUTBIL/attachments/SC/products_files/011014.dat

http://gid-piter.ru/upload/011014.dat

http://k-dialog.ru/libraries/legacy/form/011014.dat

http://ikt-msk.ru/plugins/finder/011014.dat

http://odsint2.com/js/tiny_mce/utils/st.php?id=do

Targets

    • Target

      dd7c054e96f61730670964c414e0e07fee8d1c44564ff183136c6272bdb27ec0

    • Size

      131KB

    • MD5

      0b42af1852f7f082ec63617d9a39eac9

    • SHA1

      7f29ae89ca3e1a6de9ef326eec49e7d119fbaa13

    • SHA256

      dd7c054e96f61730670964c414e0e07fee8d1c44564ff183136c6272bdb27ec0

    • SHA512

      673eb35c6494c372ccff4eefbc4b62e37b4c83905584913d4524e766abe39c167e93a4e066d609ba6efea360cdda6181ae32b15ed7d8051cc3a9b73ab90c6a8e

    • SSDEEP

      3072:7qu3HSWaxXpX0wWd2QDyIlBnU1DDe0ZSqMud6mq:7pXdY0ld2odUdK3huFq

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks