General

  • Target

    f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe

  • Size

    498KB

  • Sample

    240820-clcwnasdrp

  • MD5

    0dc91d39870a081f44b8429dcfbc223f

  • SHA1

    2033cf336c22ca200e212333a4ebecfc25eeb43f

  • SHA256

    f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb

  • SHA512

    6cd2218a0bb9bc4b177173d03076a1af59a6d1f38dac7fc5f1d7a89c385b4205490706a8c44e34551ba237e585ffeb26f42b7dd6e902754d6a6a16f07000dddd

  • SSDEEP

    12288:C9Y0A+J8888888x8MnBOky33qKQRaVogh8juqjYFa4n+Fo6xg:gnPJ8888888x8MnBg33qKQRaVogh8jJE

Malware Config

Extracted

Family

pony

C2

http://dillion0mill.favcc1.com/gate.php

Targets

    • Target

      f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe

    • Size

      498KB

    • MD5

      0dc91d39870a081f44b8429dcfbc223f

    • SHA1

      2033cf336c22ca200e212333a4ebecfc25eeb43f

    • SHA256

      f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb

    • SHA512

      6cd2218a0bb9bc4b177173d03076a1af59a6d1f38dac7fc5f1d7a89c385b4205490706a8c44e34551ba237e585ffeb26f42b7dd6e902754d6a6a16f07000dddd

    • SSDEEP

      12288:C9Y0A+J8888888x8MnBOky33qKQRaVogh8juqjYFa4n+Fo6xg:gnPJ8888888x8MnBg33qKQRaVogh8jJE

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks