General

  • Target

    d2c04ff8a301233ce5febcbde3c5242dc1093b3d9e4f2597c4632ca848a9a046

  • Size

    160KB

  • Sample

    241128-ecbckstqgw

  • MD5

    50372b8bc598758fd5d85102172a3735

  • SHA1

    3be32de76798e152dd199984c6941055f544f411

  • SHA256

    d2c04ff8a301233ce5febcbde3c5242dc1093b3d9e4f2597c4632ca848a9a046

  • SHA512

    e825b2d28940bc5a0a95b8ea9c4a0c12a8611fd014199ccf31d74c35b66f185160a313e7c1f3707afaeaaadc87efde3922b101365a353b14a73af1f850f96bec

  • SSDEEP

    3072:jik8/Lfyzvm6Rf6Omn/0sX096MGUlR4WjK:G/LqzBwzcsXXMDBu

Malware Config

Extracted

Family

pony

C2

http://jokeplek.pw/gate.php

http://vodalix.pw/gate.php

Targets

    • Target

      d2c04ff8a301233ce5febcbde3c5242dc1093b3d9e4f2597c4632ca848a9a046

    • Size

      160KB

    • MD5

      50372b8bc598758fd5d85102172a3735

    • SHA1

      3be32de76798e152dd199984c6941055f544f411

    • SHA256

      d2c04ff8a301233ce5febcbde3c5242dc1093b3d9e4f2597c4632ca848a9a046

    • SHA512

      e825b2d28940bc5a0a95b8ea9c4a0c12a8611fd014199ccf31d74c35b66f185160a313e7c1f3707afaeaaadc87efde3922b101365a353b14a73af1f850f96bec

    • SSDEEP

      3072:jik8/Lfyzvm6Rf6Omn/0sX096MGUlR4WjK:G/LqzBwzcsXXMDBu

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks