General

  • Target

    ba1265a1174ad743d8ceaaef22676ca56030647b648c090b5fc59885c17d36b1.exe

  • Size

    261KB

  • Sample

    241128-xabvfa1qfq

  • MD5

    87824b930f16fa85c9d6e204c65bab63

  • SHA1

    d239ab803b03512dc1ce5dabef5b535535c1fd29

  • SHA256

    ba1265a1174ad743d8ceaaef22676ca56030647b648c090b5fc59885c17d36b1

  • SHA512

    8831c8693d5765a5709ba62475258ef95a7885d8c970800ec634518a6b420fd58ed4f663c80b4b68ad62f5116f90ca5e5d667ec4b97d8a9e2195df68cacc407c

  • SSDEEP

    3072:YQXWydZFSHrDurD45T7NBteYwAe7iJKIxfTiMehVqLPLLLLLDLLLLLL3LLLLLLLa:wG38t1wAe79IZG2YcKkc

Malware Config

Extracted

Family

pony

C2

http://al-shifaa.com/cubby/gate.php

Targets

    • Target

      ba1265a1174ad743d8ceaaef22676ca56030647b648c090b5fc59885c17d36b1.exe

    • Size

      261KB

    • MD5

      87824b930f16fa85c9d6e204c65bab63

    • SHA1

      d239ab803b03512dc1ce5dabef5b535535c1fd29

    • SHA256

      ba1265a1174ad743d8ceaaef22676ca56030647b648c090b5fc59885c17d36b1

    • SHA512

      8831c8693d5765a5709ba62475258ef95a7885d8c970800ec634518a6b420fd58ed4f663c80b4b68ad62f5116f90ca5e5d667ec4b97d8a9e2195df68cacc407c

    • SSDEEP

      3072:YQXWydZFSHrDurD45T7NBteYwAe7iJKIxfTiMehVqLPLLLLLDLLLLLL3LLLLLLLa:wG38t1wAe79IZG2YcKkc

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks