General

  • Target

    32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe

  • Size

    95KB

  • Sample

    241129-a761hswrd1

  • MD5

    947e80d98a8c8eda82327937f91ec3b0

  • SHA1

    66392ee63d5fb6a8ea4daf066205277eb11eb06c

  • SHA256

    32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2

  • SHA512

    4a4d7892815a9dcf1e649c9eec849a6f9478dd4ac88b650cb2cf80c124ca26c2daf8bc4a9ac71927c7411ee1a538fa9025414f0a69d382e7b93486c61c28d83c

  • SSDEEP

    1536:Q87uzDyU3cDzaw6qbKXK1A7TI+a8TFM8Er3s0X0vRWs+vwM1hxN:Q87uzD/sDf6qbK61YC8TTErcN0/

Malware Config

Extracted

Family

pony

C2

http://vkdlho.pw:4915/way/like.php

http://kldlry.pw:4915/way/like.php

Targets

    • Target

      32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe

    • Size

      95KB

    • MD5

      947e80d98a8c8eda82327937f91ec3b0

    • SHA1

      66392ee63d5fb6a8ea4daf066205277eb11eb06c

    • SHA256

      32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2

    • SHA512

      4a4d7892815a9dcf1e649c9eec849a6f9478dd4ac88b650cb2cf80c124ca26c2daf8bc4a9ac71927c7411ee1a538fa9025414f0a69d382e7b93486c61c28d83c

    • SSDEEP

      1536:Q87uzDyU3cDzaw6qbKXK1A7TI+a8TFM8Er3s0X0vRWs+vwM1hxN:Q87uzD/sDf6qbK61YC8TTErcN0/

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks