General

  • Target

    3474e5d9766572eff4651cbf973194cbaaaa11b8c3b1c068b7730b0d31b66b57

  • Size

    151KB

  • Sample

    221201-fvhp2sbg3t

  • MD5

    a7ba77cfa259b793edac5d31357d93c0

  • SHA1

    116a3d59c8d56269491f39083e6ec5b1c968eca5

  • SHA256

    3474e5d9766572eff4651cbf973194cbaaaa11b8c3b1c068b7730b0d31b66b57

  • SHA512

    f990bd74e5190c6a1437388dff44d9d184ea4efc9a6f7a973f0157d685e997eb6fd81730d9ae90b7fd6465a6de5e6881e4d8fe080d203f7b5bfa84c78d72208a

  • SSDEEP

    3072:cuOhr0aGBqwCzlxIODVn1ItbzSv+rYeuFu8WwBbQSAh/ES7tDE7udyACOBWgqbxT:f30nHOJGB7mOeCwE

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/forum/viewtopic.php

http://216.231.139.111/forum/viewtopic.php

Attributes
  • payload_url

    http://birdofparadisepub.com/poQYPP.exe

    http://www.carddebtgone.com/NW6.exe

    http://capital-marketing.me/yqMb.exe

Targets

    • Target

      3474e5d9766572eff4651cbf973194cbaaaa11b8c3b1c068b7730b0d31b66b57

    • Size

      151KB

    • MD5

      a7ba77cfa259b793edac5d31357d93c0

    • SHA1

      116a3d59c8d56269491f39083e6ec5b1c968eca5

    • SHA256

      3474e5d9766572eff4651cbf973194cbaaaa11b8c3b1c068b7730b0d31b66b57

    • SHA512

      f990bd74e5190c6a1437388dff44d9d184ea4efc9a6f7a973f0157d685e997eb6fd81730d9ae90b7fd6465a6de5e6881e4d8fe080d203f7b5bfa84c78d72208a

    • SSDEEP

      3072:cuOhr0aGBqwCzlxIODVn1ItbzSv+rYeuFu8WwBbQSAh/ES7tDE7udyACOBWgqbxT:f30nHOJGB7mOeCwE

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks