General

  • Target

    af46e332f14e11497b4a1a551788c1025af68320de0eb5fd9d79c40749fa4337

  • Size

    55KB

  • Sample

    221203-chnhzsef88

  • MD5

    075211c5766cfbd4e30c6e0e0ec854a3

  • SHA1

    f5ced525c96b36568116d242e7cdde6be02063ae

  • SHA256

    af46e332f14e11497b4a1a551788c1025af68320de0eb5fd9d79c40749fa4337

  • SHA512

    e8f83983763cd17dd3a73639c2c044511e773a3edc7dbf67c4edce066faf497d9fa588b0544b218bda897cbef85291dd173f14ca4e01fec72c13a191058d0711

  • SSDEEP

    1536:sQNwdnpw5jjfZ9vQwwG5rtlMpKbhgwWhKC4j8Pt:sQMny5jzZBQww4tlMpWdCbPt

Malware Config

Extracted

Family

pony

C2

http://shilajit.biz/default.php?eDPUJpnHPW7ytIjBztXhA6clOcEx6I3gVfrFkQT

http://haidir.host22.com/default.php?jZSmd5LQhfOD3aoahfQiZ8UsyoRXViqhOU

http://bobblebook.com/default.php?OAwKZEinajudFBTtWAMNCAWxDLDhXeogxUgAV

http://bobblenovel.com/default.php?Tlom9R2gNadgP4YDhf2OjoRB8x2Mv6s7oZzY

http://containerwatergarden.com/default.php?3kYbHEBhrHn61DTW4IasCGNgUKq

Targets

    • Target

      af46e332f14e11497b4a1a551788c1025af68320de0eb5fd9d79c40749fa4337

    • Size

      55KB

    • MD5

      075211c5766cfbd4e30c6e0e0ec854a3

    • SHA1

      f5ced525c96b36568116d242e7cdde6be02063ae

    • SHA256

      af46e332f14e11497b4a1a551788c1025af68320de0eb5fd9d79c40749fa4337

    • SHA512

      e8f83983763cd17dd3a73639c2c044511e773a3edc7dbf67c4edce066faf497d9fa588b0544b218bda897cbef85291dd173f14ca4e01fec72c13a191058d0711

    • SSDEEP

      1536:sQNwdnpw5jjfZ9vQwwG5rtlMpKbhgwWhKC4j8Pt:sQMny5jzZBQww4tlMpWdCbPt

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks