General

  • Target

    dc15be84ecae80770e316be62b259ab7

  • Size

    91KB

  • Sample

    240321-tyttdafd98

  • MD5

    dc15be84ecae80770e316be62b259ab7

  • SHA1

    b5ab2a3a86e3429efede6b65f4cc273744c644ba

  • SHA256

    4ffee6d2299977c9fdf27dd96eb9b5d6fda44bb415a6e8c4b395f5f5edd5133b

  • SHA512

    0dbd0bbb7830195bda69b27b299c118d2d716ae8c5f9d4e577527dc7fda36940727df07df1d352fdd516ed9f218c08eaaa2e522bfa30e1bd1f4daa37b7bd3966

  • SSDEEP

    1536:IeCX5pulHFjKZFppjUv4jcJbQd4xj/4wTEd2kgBrGhgnHTDv0I44rZqRnQcR:IP5puleVjaQgVTm2kg9GgvvOdQcR

Malware Config

Extracted

Family

pony

C2

http://infovega.lt:8080/pony/gate.php

http://subdatapro.com:8008/pony/gate.php

Attributes
  • payload_url

    http://www.eb3btz.com/72fTmEXk/w9ks9.exe

    http://ftp.imperiumit.com.br/gvoWhVVf/kmSdem1.exe

    http://lavanderiatingemais.com.br/F6EyS5D7/A5m.exe

Targets

    • Target

      dc15be84ecae80770e316be62b259ab7

    • Size

      91KB

    • MD5

      dc15be84ecae80770e316be62b259ab7

    • SHA1

      b5ab2a3a86e3429efede6b65f4cc273744c644ba

    • SHA256

      4ffee6d2299977c9fdf27dd96eb9b5d6fda44bb415a6e8c4b395f5f5edd5133b

    • SHA512

      0dbd0bbb7830195bda69b27b299c118d2d716ae8c5f9d4e577527dc7fda36940727df07df1d352fdd516ed9f218c08eaaa2e522bfa30e1bd1f4daa37b7bd3966

    • SSDEEP

      1536:IeCX5pulHFjKZFppjUv4jcJbQd4xj/4wTEd2kgBrGhgnHTDv0I44rZqRnQcR:IP5puleVjaQgVTm2kg9GgvvOdQcR

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks