General

  • Target

    203c5ba77074cc8c916e0c6d62dc7227a5bfbf83265ce620e83763f1c32c7983N

  • Size

    291KB

  • Sample

    240918-ekysva1hkc

  • MD5

    e1c3629119f5302d063ffdc6b12ea3b0

  • SHA1

    f00fcee9d817012bd14477dc4ca1168a8768e4a2

  • SHA256

    203c5ba77074cc8c916e0c6d62dc7227a5bfbf83265ce620e83763f1c32c7983

  • SHA512

    a9973c250c8d0f58d66e490f0849ff521dbb8deb910999d136d12b59b1d55d7f13ecb8cba27229d3cede1cf9a92666026eef9d88d8c1c62f9455640eb5b66631

  • SSDEEP

    6144:TTDGSslfdUY26SmrEsNU8BsR3E5BOiUgUAUaBvS9ltGrnRgCm:JsyUEYBscB13UAOenGl

Malware Config

Targets

    • Target

      203c5ba77074cc8c916e0c6d62dc7227a5bfbf83265ce620e83763f1c32c7983N

    • Size

      291KB

    • MD5

      e1c3629119f5302d063ffdc6b12ea3b0

    • SHA1

      f00fcee9d817012bd14477dc4ca1168a8768e4a2

    • SHA256

      203c5ba77074cc8c916e0c6d62dc7227a5bfbf83265ce620e83763f1c32c7983

    • SHA512

      a9973c250c8d0f58d66e490f0849ff521dbb8deb910999d136d12b59b1d55d7f13ecb8cba27229d3cede1cf9a92666026eef9d88d8c1c62f9455640eb5b66631

    • SSDEEP

      6144:TTDGSslfdUY26SmrEsNU8BsR3E5BOiUgUAUaBvS9ltGrnRgCm:JsyUEYBscB13UAOenGl

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks