General

  • Target

    debdb525bf56212d7d951a22215367e0

  • Size

    127KB

  • Sample

    240326-kj8vbaed55

  • MD5

    debdb525bf56212d7d951a22215367e0

  • SHA1

    fa64c64b5d833a284808bb9a31c886e13c0d0704

  • SHA256

    95b59ef096e24e28534ab1788671a8c044539d4f5d28a3ed5d3d36e81b3d4415

  • SHA512

    69a5e63f1456e4bd49b0bf5a2cab2c019279ba25c9921fbef6e1c0d123fd88c98af5da6ee18fd5209197cb598f7eaf50e36f4c0297d52daa8317552a9ec3dd55

  • SSDEEP

    1536:X+xV0ht8Yzk0UyRIDJV3/1veMciKZ4m2sd99SIvlysxPgIbNKCzQaWSITr80y:phufGmDJxeZ449/9hjzYZn80y

Malware Config

Extracted

Family

pony

C2

http://37.59.66.237/pony/gate.php

Attributes
  • payload_url

    http://ftp.irpiniaoggi.it/iztD.exe

    http://www.w3haus.com.br/28wio.exe

Targets

    • Target

      debdb525bf56212d7d951a22215367e0

    • Size

      127KB

    • MD5

      debdb525bf56212d7d951a22215367e0

    • SHA1

      fa64c64b5d833a284808bb9a31c886e13c0d0704

    • SHA256

      95b59ef096e24e28534ab1788671a8c044539d4f5d28a3ed5d3d36e81b3d4415

    • SHA512

      69a5e63f1456e4bd49b0bf5a2cab2c019279ba25c9921fbef6e1c0d123fd88c98af5da6ee18fd5209197cb598f7eaf50e36f4c0297d52daa8317552a9ec3dd55

    • SSDEEP

      1536:X+xV0ht8Yzk0UyRIDJV3/1veMciKZ4m2sd99SIvlysxPgIbNKCzQaWSITr80y:phufGmDJxeZ449/9hjzYZn80y

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks