General

  • Target

    5a6cc5f1328099351702ee09df1afaa9dee16d3a2a7261fe1590949b1eb97500N

  • Size

    94KB

  • Sample

    241023-skm81aydnn

  • MD5

    62e01945f4af57b2de1f74666838a090

  • SHA1

    2bc44004b79cdbeac42dd0e4e5d1034f2a0a88f5

  • SHA256

    5a6cc5f1328099351702ee09df1afaa9dee16d3a2a7261fe1590949b1eb97500

  • SHA512

    9bf78b26a58a05bd66ead7da70d884a24c5a5380ea3d03f050e926bdeadd5328790ed295f06a822908adbfc0ec38751721307c18ade7002fb0619ac550160f9f

  • SSDEEP

    1536:RNQr961spIM1GEN0wPMl/PURa4d/DZ4qWyiUThvRlK9wMSC5:Rmr96G2M1GEuw0F+vaqWQnAr

Malware Config

Extracted

Family

pony

C2

http://kdyukhj.pw:4915/way/like.php

http://fnhgju.pw:4915/way/like.php

Targets

    • Target

      5a6cc5f1328099351702ee09df1afaa9dee16d3a2a7261fe1590949b1eb97500N

    • Size

      94KB

    • MD5

      62e01945f4af57b2de1f74666838a090

    • SHA1

      2bc44004b79cdbeac42dd0e4e5d1034f2a0a88f5

    • SHA256

      5a6cc5f1328099351702ee09df1afaa9dee16d3a2a7261fe1590949b1eb97500

    • SHA512

      9bf78b26a58a05bd66ead7da70d884a24c5a5380ea3d03f050e926bdeadd5328790ed295f06a822908adbfc0ec38751721307c18ade7002fb0619ac550160f9f

    • SSDEEP

      1536:RNQr961spIM1GEN0wPMl/PURa4d/DZ4qWyiUThvRlK9wMSC5:Rmr96G2M1GEuw0F+vaqWQnAr

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks