General

  • Target

    6ef85bb567ab3f82c23f65f9ec0a8a26

  • Size

    144KB

  • Sample

    231226-pszp8adca5

  • MD5

    6ef85bb567ab3f82c23f65f9ec0a8a26

  • SHA1

    72150531237892c20b809f71706ddd5f11938428

  • SHA256

    08b975da0089ef02e59b0dd24c755c32edd2d92f6a1edb4ba3acbe5a1fee5ece

  • SHA512

    50502677ba22d0bfa568f71629c3712d43045459b2902a67aeb6aae6108cf91bee69e0cac09cc754ffde8484490e0ce187be7beec9804ca578f33cced327637b

  • SSDEEP

    3072:tlCZwX7wRUQHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHY:fCZwX0JSn8YoLLVrbwzuaj2rH

Malware Config

Extracted

Family

pony

C2

http://74.53.97.66:8080/forum/viewtopic.php

http://74.53.97.67:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://orion.obidigital.net/d09ZhGf.exe

    http://ftp.lastraautosport.com.ar/xjH.exe

Targets

    • Target

      6ef85bb567ab3f82c23f65f9ec0a8a26

    • Size

      144KB

    • MD5

      6ef85bb567ab3f82c23f65f9ec0a8a26

    • SHA1

      72150531237892c20b809f71706ddd5f11938428

    • SHA256

      08b975da0089ef02e59b0dd24c755c32edd2d92f6a1edb4ba3acbe5a1fee5ece

    • SHA512

      50502677ba22d0bfa568f71629c3712d43045459b2902a67aeb6aae6108cf91bee69e0cac09cc754ffde8484490e0ce187be7beec9804ca578f33cced327637b

    • SSDEEP

      3072:tlCZwX7wRUQHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHY:fCZwX0JSn8YoLLVrbwzuaj2rH

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks