General

  • Target

    0c59a1ba6af268c0f04d6d9defbb9def98642e72e9a571e240f91608d4ab004b

  • Size

    120KB

  • Sample

    221128-nejw6saa38

  • MD5

    426f0f67d72f5246119e0e0a12eec1f9

  • SHA1

    383c96f78bc6b2ea51302bae2dd06e05516ecbd8

  • SHA256

    0c59a1ba6af268c0f04d6d9defbb9def98642e72e9a571e240f91608d4ab004b

  • SHA512

    551d3c72953b9f1a8fd05e7c349a5d41f92e68d0e4812efeac0f4aa9c7766bb95c0d4b8fd1cc31ea292644babfc06ddeee1e8e02d6d28a9bfc222295b12c02d5

  • SSDEEP

    1536:Mma7C0WB6ElccSm/suVxmMAEXP62rtwcuz3sb3RZGv+VvRTjqktcs7KpXvEz:M/WBVEmJ+W6aGHQiv+5T7asGpO

Malware Config

Extracted

Family

pony

C2

http://ygentsids.pw/pony/gate.php

http://rrote.pw/pony/gate.php

http://lworte.com/pony/gate.php

Targets

    • Target

      0c59a1ba6af268c0f04d6d9defbb9def98642e72e9a571e240f91608d4ab004b

    • Size

      120KB

    • MD5

      426f0f67d72f5246119e0e0a12eec1f9

    • SHA1

      383c96f78bc6b2ea51302bae2dd06e05516ecbd8

    • SHA256

      0c59a1ba6af268c0f04d6d9defbb9def98642e72e9a571e240f91608d4ab004b

    • SHA512

      551d3c72953b9f1a8fd05e7c349a5d41f92e68d0e4812efeac0f4aa9c7766bb95c0d4b8fd1cc31ea292644babfc06ddeee1e8e02d6d28a9bfc222295b12c02d5

    • SSDEEP

      1536:Mma7C0WB6ElccSm/suVxmMAEXP62rtwcuz3sb3RZGv+VvRTjqktcs7KpXvEz:M/WBVEmJ+W6aGHQiv+5T7asGpO

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks