General

  • Target

    910ce1937d08c0a800d222148982a3eb5c6ec1d7a8d190ca31fcf010f7b61c5e

  • Size

    144KB

  • Sample

    221201-z1w96sbg35

  • MD5

    b84aaaa9bd1114a8f39c6847b16cf63d

  • SHA1

    3aa58f57cbd3868eb1e5a3de9366b279f540088a

  • SHA256

    910ce1937d08c0a800d222148982a3eb5c6ec1d7a8d190ca31fcf010f7b61c5e

  • SHA512

    5d68db1e0a35089e9067ac292886979d95ec34aea75d6436a0b02e1ff62b5d0c828694277654f74dd236735c8aee6ff15f98817afe85bc02cced8a12c6d1518e

  • SSDEEP

    3072:oDZaZeFbL2PDVlZ2ilhdh+ukIRObZzFpdXpaJxqvHUgrQ:wgeYDVL2irv+UYbHZazqMwQ

Malware Config

Extracted

Family

pony

C2

http://74.53.97.66:8080/forum/viewtopic.php

http://74.53.97.67:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://allsights.com/bmvnV5HK.exe

    http://www.erdemsifa.com/kT8C.exe

    http://proline360.com/8Ee0zfch.exe

Targets

    • Target

      910ce1937d08c0a800d222148982a3eb5c6ec1d7a8d190ca31fcf010f7b61c5e

    • Size

      144KB

    • MD5

      b84aaaa9bd1114a8f39c6847b16cf63d

    • SHA1

      3aa58f57cbd3868eb1e5a3de9366b279f540088a

    • SHA256

      910ce1937d08c0a800d222148982a3eb5c6ec1d7a8d190ca31fcf010f7b61c5e

    • SHA512

      5d68db1e0a35089e9067ac292886979d95ec34aea75d6436a0b02e1ff62b5d0c828694277654f74dd236735c8aee6ff15f98817afe85bc02cced8a12c6d1518e

    • SSDEEP

      3072:oDZaZeFbL2PDVlZ2ilhdh+ukIRObZzFpdXpaJxqvHUgrQ:wgeYDVL2irv+UYbHZazqMwQ

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks