General

  • Target

    fdda4ae8a03988bc3250ff0d853a29b98c3ed6693d7df3a95a63678f087aa0b8N

  • Size

    115KB

  • Sample

    241017-haw32swdrf

  • MD5

    2cc20dda325a62bf9756e30288e548a0

  • SHA1

    ee1856ed4b741033b047821e72f48c5e8f52063b

  • SHA256

    fdda4ae8a03988bc3250ff0d853a29b98c3ed6693d7df3a95a63678f087aa0b8

  • SHA512

    aa7a651d9f7aa328df89a1d0bd5ba29d6be0d06f5388d99a28570fadf05365d90132d4292d779199d754c710aac0ed1e444f2390349c29eb145af7361647100f

  • SSDEEP

    3072:pq+xq3lJNolWG2M1GEWQSRODvM9CU2BUfoh+SSW:UVJeQkGbQSgrM9s/JS

Malware Config

Extracted

Family

pony

C2

http://fgczxvn.pw:4915/way/like.php

http://hdujkyu.pw:4915/way/like.php

Targets

    • Target

      fdda4ae8a03988bc3250ff0d853a29b98c3ed6693d7df3a95a63678f087aa0b8N

    • Size

      115KB

    • MD5

      2cc20dda325a62bf9756e30288e548a0

    • SHA1

      ee1856ed4b741033b047821e72f48c5e8f52063b

    • SHA256

      fdda4ae8a03988bc3250ff0d853a29b98c3ed6693d7df3a95a63678f087aa0b8

    • SHA512

      aa7a651d9f7aa328df89a1d0bd5ba29d6be0d06f5388d99a28570fadf05365d90132d4292d779199d754c710aac0ed1e444f2390349c29eb145af7361647100f

    • SSDEEP

      3072:pq+xq3lJNolWG2M1GEWQSRODvM9CU2BUfoh+SSW:UVJeQkGbQSgrM9s/JS

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks