General

  • Target

    922882df21308dd0ff00f5fe97d0e90e4a8028f36417897e956b6965eacb7e41

  • Size

    147KB

  • Sample

    221129-f2r73ach8s

  • MD5

    438d5f2b57f078a4f5c50c5f8be021e8

  • SHA1

    0fb9506191a0aa6cb854a5fe43b155f3826be148

  • SHA256

    922882df21308dd0ff00f5fe97d0e90e4a8028f36417897e956b6965eacb7e41

  • SHA512

    c4e3ec33f4d26a80e7121bd33da76857643be3900742c241288de9968b924e4f949904755ba04156a9bf6c20d9442b08fa29e51f28a22f48dd85e5b26112be88

  • SSDEEP

    3072:bzxiBaeYkSKVVIaav4N4d9GQqokwlaLvzH1DPRB0CingqE:h60BZEQGUafB01i

Malware Config

Extracted

Family

pony

C2

http://66.55.89.148:8080/forum/viewtopic.php

http://66.55.89.149:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://marottamare.it/ha0.exe

    http://taznet.net/3Bs.exe

    http://stellenboschheritage.co.za/6HefV0.exe

    http://etradi.webgenshop.nl/xWP.exe

Targets

    • Target

      922882df21308dd0ff00f5fe97d0e90e4a8028f36417897e956b6965eacb7e41

    • Size

      147KB

    • MD5

      438d5f2b57f078a4f5c50c5f8be021e8

    • SHA1

      0fb9506191a0aa6cb854a5fe43b155f3826be148

    • SHA256

      922882df21308dd0ff00f5fe97d0e90e4a8028f36417897e956b6965eacb7e41

    • SHA512

      c4e3ec33f4d26a80e7121bd33da76857643be3900742c241288de9968b924e4f949904755ba04156a9bf6c20d9442b08fa29e51f28a22f48dd85e5b26112be88

    • SSDEEP

      3072:bzxiBaeYkSKVVIaav4N4d9GQqokwlaLvzH1DPRB0CingqE:h60BZEQGUafB01i

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks