General

  • Target

    88fcf333dd160288d98a67ad3e62348a341b7f199b281e6098a3cc31567f7d44

  • Size

    311KB

  • Sample

    221127-sz7aesha43

  • MD5

    dff4ee148f446f4b078b09a96475b21c

  • SHA1

    2c5fe2d19f378b0a900afed0b3c2f3d22a45708e

  • SHA256

    88fcf333dd160288d98a67ad3e62348a341b7f199b281e6098a3cc31567f7d44

  • SHA512

    12eb72d8a010bf48459c22eb486e569fdc77d21ef894389b66e70ee85aa17b1f2ab81853cd68609cc42a394b4af50a6d6b612ba94749da675833e395bb474791

  • SSDEEP

    6144:ijyYve1PQhD6BwPcVM/wfBFyXjvykmNBklL3IUQyUnbdjPIb:ij5oC6wEZLyXjvykmNBe3IUU58

Malware Config

Extracted

Family

pony

C2

http://91.220.163.21/pony/gate.php

Targets

    • Target

      88fcf333dd160288d98a67ad3e62348a341b7f199b281e6098a3cc31567f7d44

    • Size

      311KB

    • MD5

      dff4ee148f446f4b078b09a96475b21c

    • SHA1

      2c5fe2d19f378b0a900afed0b3c2f3d22a45708e

    • SHA256

      88fcf333dd160288d98a67ad3e62348a341b7f199b281e6098a3cc31567f7d44

    • SHA512

      12eb72d8a010bf48459c22eb486e569fdc77d21ef894389b66e70ee85aa17b1f2ab81853cd68609cc42a394b4af50a6d6b612ba94749da675833e395bb474791

    • SSDEEP

      6144:ijyYve1PQhD6BwPcVM/wfBFyXjvykmNBklL3IUQyUnbdjPIb:ij5oC6wEZLyXjvykmNBe3IUU58

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks