General

  • Target

    6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113

  • Size

    222KB

  • Sample

    241020-1ev1na1erc

  • MD5

    1a9d520dd9a594a0e27bd75e0bed8fd6

  • SHA1

    a55f6eb53742665288bb6691e686ff98771f8b84

  • SHA256

    6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113

  • SHA512

    def5c37116a35172b8f786ad31f2b9f0523d93e7897805a3674d98c92cca7205bb94a5682aa3b6f5bed6e76d0a8584221db1b536bba5140764411b6aac83384f

  • SSDEEP

    3072:zVIfFuR6AqFMa2fL3NtkWL90y7K4mlQCww7zDTW6HNRn0nPmaw:zVIf8RsOtZclptz78Pk

Malware Config

Extracted

Family

pony

C2

http://fouseevenghedt.ru/gate.php

http://biledroben.ru/gate.php

http://rohironrof.ru/gate.php

Attributes
  • payload_url

    http://eloraestate.com/wp-content/plugins/prism-highlight/opera1.exe

    http://edmontonlimo247.com/wp-content/plugins/prism-highlight/opera1.exe

    http://dgfcomercial.com.br/wp-content/plugins/prism-highlight/opera1.exe

Targets

    • Target

      6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113

    • Size

      222KB

    • MD5

      1a9d520dd9a594a0e27bd75e0bed8fd6

    • SHA1

      a55f6eb53742665288bb6691e686ff98771f8b84

    • SHA256

      6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113

    • SHA512

      def5c37116a35172b8f786ad31f2b9f0523d93e7897805a3674d98c92cca7205bb94a5682aa3b6f5bed6e76d0a8584221db1b536bba5140764411b6aac83384f

    • SSDEEP

      3072:zVIfFuR6AqFMa2fL3NtkWL90y7K4mlQCww7zDTW6HNRn0nPmaw:zVIf8RsOtZclptz78Pk

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks