General

  • Target

    d713107018fda444f8afee1985f6461b

  • Size

    107KB

  • Sample

    240319-zh9sjsfh2x

  • MD5

    d713107018fda444f8afee1985f6461b

  • SHA1

    028ba08bee4b563b2462ffb87f1e92bb8b3175c8

  • SHA256

    26cb9b38fa9cd5d5db0b4361843af355b44a1471fcbcffbd0942bb9343aa8519

  • SHA512

    8e33ae9a8075794261fd9263b5e050d8ca10f7be3b4b59b61b60b05d0bc30bc76cd045ff66639a807c4df264426e370e43c9a2da06e46ea5729d1518b4b14650

  • SSDEEP

    3072:MFea5aeNYCRzyf4n6LUTbca7CoxYO6UzBQs1E:Q5HTRzy86IT6OHzm

Malware Config

Extracted

Family

pony

C2

http://91.121.84.204:8080/pony/gate.php

http://91.121.93.178:8080/pony/gate.php

Attributes
  • payload_url

    http://power-tec.sk/D8aoPu86/XPVqAGE.exe

    http://valuemerge.com/aXS0mRNT/KXj.exe

    http://eleanorforhire.com.au/CWWrvcPe/nxp62Wk.exe

Targets

    • Target

      d713107018fda444f8afee1985f6461b

    • Size

      107KB

    • MD5

      d713107018fda444f8afee1985f6461b

    • SHA1

      028ba08bee4b563b2462ffb87f1e92bb8b3175c8

    • SHA256

      26cb9b38fa9cd5d5db0b4361843af355b44a1471fcbcffbd0942bb9343aa8519

    • SHA512

      8e33ae9a8075794261fd9263b5e050d8ca10f7be3b4b59b61b60b05d0bc30bc76cd045ff66639a807c4df264426e370e43c9a2da06e46ea5729d1518b4b14650

    • SSDEEP

      3072:MFea5aeNYCRzyf4n6LUTbca7CoxYO6UzBQs1E:Q5HTRzy86IT6OHzm

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks