General

  • Target

    0731218a708f1caed8a253a98e4269444ff45f3f378511a50a434968afaa98a4N.exe

  • Size

    261KB

  • Sample

    241125-d5p6rswngt

  • MD5

    af5f75a75ee0dd29b36b1d6a225d7b40

  • SHA1

    63c64b735e4b45d99205d05b1a69a3ab65dd1447

  • SHA256

    0731218a708f1caed8a253a98e4269444ff45f3f378511a50a434968afaa98a4

  • SHA512

    08b83ca3eb396e8c714c6e05f4c52359e3e2eb6514eda5ca57024b2cf9bb72b0e8700941067c0daf9ff9782b24c183216b05c564a82718e5278c63fa80c16262

  • SSDEEP

    3072:YQXWydZFSHrDurD45T7NBteYwAe7iJKIxfTiMehVqLPLLLLLDLLLLLL3LLLLLLLH:wG38t1wAe79IZG2YcKk

Malware Config

Extracted

Family

pony

C2

http://al-shifaa.com/cubby/gate.php

Targets

    • Target

      0731218a708f1caed8a253a98e4269444ff45f3f378511a50a434968afaa98a4N.exe

    • Size

      261KB

    • MD5

      af5f75a75ee0dd29b36b1d6a225d7b40

    • SHA1

      63c64b735e4b45d99205d05b1a69a3ab65dd1447

    • SHA256

      0731218a708f1caed8a253a98e4269444ff45f3f378511a50a434968afaa98a4

    • SHA512

      08b83ca3eb396e8c714c6e05f4c52359e3e2eb6514eda5ca57024b2cf9bb72b0e8700941067c0daf9ff9782b24c183216b05c564a82718e5278c63fa80c16262

    • SSDEEP

      3072:YQXWydZFSHrDurD45T7NBteYwAe7iJKIxfTiMehVqLPLLLLLDLLLLLL3LLLLLLLH:wG38t1wAe79IZG2YcKk

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks