General

  • Target

    b9c569de1ab489e0c59b63c67ea7d246.exe

  • Size

    91KB

  • Sample

    230703-qy359sgf36

  • MD5

    b9c569de1ab489e0c59b63c67ea7d246

  • SHA1

    90b24db43bf99e8afe907674c32f179e2e148cf4

  • SHA256

    f9dfede1853829ca67388699b8d6b8571e1b8e0954ae4afdd400e139a07c6ce2

  • SHA512

    7defdc185f159138100d3e74867272705d8c8f1e2d5e82323f7aaf648f7ff240e9a269731752af7a4f4f294f01c1268b3c651a07f5a368dd2581a02e38309dff

  • SSDEEP

    1536:Ejti2vkF84qTBx1qOWopAFZaSYs405K3aiOacCTvdkzkwNM8:k44kGPqqAFk5s4CiOalwy8

Malware Config

Extracted

Family

pony

C2

http://luxluggage.com/forum/viewtopic.php

http://luxrebags.com/forum/viewtopic.php

http://luxrybags.com/forum/viewtopic.php

http://luxurybrandswalla.com/forum/viewtopic.php

Attributes
  • payload_url

    http://mnloyalty.com/o0z.exe

    http://medienwesen.de/Nq6cGf.exe

    http://artesofa.gr/T1Wh.exe

Targets

    • Target

      b9c569de1ab489e0c59b63c67ea7d246.exe

    • Size

      91KB

    • MD5

      b9c569de1ab489e0c59b63c67ea7d246

    • SHA1

      90b24db43bf99e8afe907674c32f179e2e148cf4

    • SHA256

      f9dfede1853829ca67388699b8d6b8571e1b8e0954ae4afdd400e139a07c6ce2

    • SHA512

      7defdc185f159138100d3e74867272705d8c8f1e2d5e82323f7aaf648f7ff240e9a269731752af7a4f4f294f01c1268b3c651a07f5a368dd2581a02e38309dff

    • SSDEEP

      1536:Ejti2vkF84qTBx1qOWopAFZaSYs405K3aiOacCTvdkzkwNM8:k44kGPqqAFk5s4CiOalwy8

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks