General

  • Target

    bd9ee3c435905228e23d1ea5cc757ca2dc35002bfce836bed6ba7ee960b659d9

  • Size

    97KB

  • Sample

    221203-gwsr3see7y

  • MD5

    73528061fe1ac655235a17ef5a395a54

  • SHA1

    c58ca4ed1162c29c06d3218e4f829ed0dcd96e34

  • SHA256

    bd9ee3c435905228e23d1ea5cc757ca2dc35002bfce836bed6ba7ee960b659d9

  • SHA512

    2b0914b789fbe758fb83b791ec658ea62ffeda790d39889327d470fee2d2a0213017eee08aec7a00bcaa36bc27fc20866431cbb932f5c55c22850cfab09238e9

  • SSDEEP

    3072:uxXegqr9jqTfTPbDgw1nRqMrCBdBIDTov2iJGMfo:18qN8U+S

Malware Config

Extracted

Family

pony

C2

http://209.59.222.170/forum/viewtopic.php

http://50.116.34.38/forum/viewtopic.php

Attributes
  • payload_url

    http://ftp.approachit.com/jZy.exe

    http://atualizacoes.issqn.net/FhPD.exe

    http://homeringer.com/tWEkgm.exe

Targets

    • Target

      bd9ee3c435905228e23d1ea5cc757ca2dc35002bfce836bed6ba7ee960b659d9

    • Size

      97KB

    • MD5

      73528061fe1ac655235a17ef5a395a54

    • SHA1

      c58ca4ed1162c29c06d3218e4f829ed0dcd96e34

    • SHA256

      bd9ee3c435905228e23d1ea5cc757ca2dc35002bfce836bed6ba7ee960b659d9

    • SHA512

      2b0914b789fbe758fb83b791ec658ea62ffeda790d39889327d470fee2d2a0213017eee08aec7a00bcaa36bc27fc20866431cbb932f5c55c22850cfab09238e9

    • SSDEEP

      3072:uxXegqr9jqTfTPbDgw1nRqMrCBdBIDTov2iJGMfo:18qN8U+S

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks