General

  • Target

    7bcddb92abe66f50861d6e233da5254b69b95c4361bd2650a7faa3e4e249bfb3N

  • Size

    365KB

  • Sample

    241017-1lx4la1eml

  • MD5

    a2da09af91a67b77cd33b1a4010fd8c0

  • SHA1

    d253ae4cbaa90d85709bde6bab9fff74ca0c7c43

  • SHA256

    7bcddb92abe66f50861d6e233da5254b69b95c4361bd2650a7faa3e4e249bfb3

  • SHA512

    e7d33225d9148682c569e2f08748a6cbd7032fc6f96fc7fc51a8707334115cf4ef27d2e50c6ce30d398b0165d70a35f17847bbc7f326d128f08b12bbcc302da1

  • SSDEEP

    6144:0D4Pl96Dtk936zp94Khqk3V2bA/K0DCwaYs3CFrlLi4FguAiWN8as7zgW:DPlQMyItA/K0DCusStN

Malware Config

Extracted

Family

pony

C2

http://willsmanten.org.in/doit-2-8thFeb-8thMarch/gate.php

Targets

    • Target

      7bcddb92abe66f50861d6e233da5254b69b95c4361bd2650a7faa3e4e249bfb3N

    • Size

      365KB

    • MD5

      a2da09af91a67b77cd33b1a4010fd8c0

    • SHA1

      d253ae4cbaa90d85709bde6bab9fff74ca0c7c43

    • SHA256

      7bcddb92abe66f50861d6e233da5254b69b95c4361bd2650a7faa3e4e249bfb3

    • SHA512

      e7d33225d9148682c569e2f08748a6cbd7032fc6f96fc7fc51a8707334115cf4ef27d2e50c6ce30d398b0165d70a35f17847bbc7f326d128f08b12bbcc302da1

    • SSDEEP

      6144:0D4Pl96Dtk936zp94Khqk3V2bA/K0DCwaYs3CFrlLi4FguAiWN8as7zgW:DPlQMyItA/K0DCusStN

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks