General

  • Target

    d880aaca91bfa4f10ea845ab1a6b734fc9f20198c8b42cb74671e58f0afc878dN

  • Size

    99KB

  • Sample

    241020-pk1bsazdmr

  • MD5

    432c39f379aed51181687751fb3088f0

  • SHA1

    ea6ba29e31f2ce9748a63011a236a010d915c4ee

  • SHA256

    d880aaca91bfa4f10ea845ab1a6b734fc9f20198c8b42cb74671e58f0afc878d

  • SHA512

    5052009fab018a68390a9a8ee08d617788dea7a22c335c6661e05f5bf464c84cf75f6f90e82f421cec165458a6d2f66c3739edbde928fc32299f1a29dc1dd454

  • SSDEEP

    1536:sx4pd8GLHyyCKi8jguEXXuAn2yHlcWMHDj1DMFR8LtqoM:ueRWyCKNbLIlcWMHDj1DMyQv

Malware Config

Extracted

Family

pony

C2

http://115.47.49.181/twXEsyUTli71/k3JRL75YXw.php

Targets

    • Target

      d880aaca91bfa4f10ea845ab1a6b734fc9f20198c8b42cb74671e58f0afc878dN

    • Size

      99KB

    • MD5

      432c39f379aed51181687751fb3088f0

    • SHA1

      ea6ba29e31f2ce9748a63011a236a010d915c4ee

    • SHA256

      d880aaca91bfa4f10ea845ab1a6b734fc9f20198c8b42cb74671e58f0afc878d

    • SHA512

      5052009fab018a68390a9a8ee08d617788dea7a22c335c6661e05f5bf464c84cf75f6f90e82f421cec165458a6d2f66c3739edbde928fc32299f1a29dc1dd454

    • SSDEEP

      1536:sx4pd8GLHyyCKi8jguEXXuAn2yHlcWMHDj1DMFR8LtqoM:ueRWyCKNbLIlcWMHDj1DMyQv

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks