General

  • Target

    b0c3e97a5b0aedfa8303ead48f62dccff2afde5d926213fcf0ed4df5b6bf3bfa

  • Size

    280KB

  • Sample

    221128-qfdsnaah6x

  • MD5

    8e88887f8e0eb0e6269fa4ffe7514b58

  • SHA1

    f39a20ef2f07f21523f202b43581979fbee520a9

  • SHA256

    b0c3e97a5b0aedfa8303ead48f62dccff2afde5d926213fcf0ed4df5b6bf3bfa

  • SHA512

    2b62f96f73bde66ee74a463c8a17829850acfac031d40047ce15e625292a8fd465701df038005b6f80b2cb0fac2cb1219690fc69e985ff334e76821db059eac6

  • SSDEEP

    6144:sFPYyAVvBeXVS8w8eWDvUWRhTK2PCzesW8Jn29:sFdnXpw8DMWRhTK2PCzesW8U

Malware Config

Extracted

Family

pony

C2

http://orji.host22.com/PonyPHP/gate.php

Targets

    • Target

      b0c3e97a5b0aedfa8303ead48f62dccff2afde5d926213fcf0ed4df5b6bf3bfa

    • Size

      280KB

    • MD5

      8e88887f8e0eb0e6269fa4ffe7514b58

    • SHA1

      f39a20ef2f07f21523f202b43581979fbee520a9

    • SHA256

      b0c3e97a5b0aedfa8303ead48f62dccff2afde5d926213fcf0ed4df5b6bf3bfa

    • SHA512

      2b62f96f73bde66ee74a463c8a17829850acfac031d40047ce15e625292a8fd465701df038005b6f80b2cb0fac2cb1219690fc69e985ff334e76821db059eac6

    • SSDEEP

      6144:sFPYyAVvBeXVS8w8eWDvUWRhTK2PCzesW8Jn29:sFdnXpw8DMWRhTK2PCzesW8U

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

2
T1114

Tasks