General

  • Target

    24b5103c075101b29fdffee781a4884cc90d100d6edc2ecf5334578b75e61de2N

  • Size

    92KB

  • Sample

    241012-sk6qca1ekl

  • MD5

    2bdf7319e3b83972be0bf911b3f1c3e0

  • SHA1

    c090c330a16e11e3051ecd5e504126b7203bd717

  • SHA256

    24b5103c075101b29fdffee781a4884cc90d100d6edc2ecf5334578b75e61de2

  • SHA512

    42017af319c7c166c1ae2aca210c636c2e29e1feb568929a7c36c137dcf23a3eb7bfd4b510f3d426263b7d3a531df9de74e7b1bf6f44f40137673c6df9ccaf6d

  • SSDEEP

    1536:1w/iBJsJstGHyMQD0ULXYCU9epLi/TQ/MK4d44HVX/Ekyi9e1fkb:W/iBSmDHkeqMMK4d1yi9Yfkb

Malware Config

Extracted

Family

pony

C2

http://132.248.49.112:8080/asp/intro.php

http://113.130.65.77:8080/asp/intro.php

http://203.113.98.131:8080/asp/intro.php

http://110.164.58.250:8080/asp/intro.php

http://200.108.18.158:8080/asp/intro.php

http://207.182.144.115:8080/asp/intro.php

http://148.208.216.70:8080/asp/intro.php

http://203.172.252.26:8080/asp/intro.php

http://202.6.120.103:8080/asp/intro.php

http://203.146.208.180:8080/asp/intro.php

http://207.126.57.208:8080/asp/intro.php

http://203.80.16.81:8080/asp/intro.php

http://202.180.221.186:8080/asp/intro.php

Targets

    • Target

      24b5103c075101b29fdffee781a4884cc90d100d6edc2ecf5334578b75e61de2N

    • Size

      92KB

    • MD5

      2bdf7319e3b83972be0bf911b3f1c3e0

    • SHA1

      c090c330a16e11e3051ecd5e504126b7203bd717

    • SHA256

      24b5103c075101b29fdffee781a4884cc90d100d6edc2ecf5334578b75e61de2

    • SHA512

      42017af319c7c166c1ae2aca210c636c2e29e1feb568929a7c36c137dcf23a3eb7bfd4b510f3d426263b7d3a531df9de74e7b1bf6f44f40137673c6df9ccaf6d

    • SSDEEP

      1536:1w/iBJsJstGHyMQD0ULXYCU9epLi/TQ/MK4d44HVX/Ekyi9e1fkb:W/iBSmDHkeqMMK4d1yi9Yfkb

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks