General

  • Target

    25749a534879f530f35f5c46415695cc8339ae8b2b6ed38f722e67e8d946051aN.exe

  • Size

    98KB

  • Sample

    241129-qxb1dsyjds

  • MD5

    9524706d11a0d0221ff6a5883a08bf10

  • SHA1

    f80c11da234f43f04e80604f01e7e9867e401c1c

  • SHA256

    25749a534879f530f35f5c46415695cc8339ae8b2b6ed38f722e67e8d946051a

  • SHA512

    805c428b32a3d4fe76481790ce76fb1276d9ce74735d27c1f9651d983aa330ca10e4b5779501541da7318445ef0f6effac9b8b1a94154dfb0308d2d893c74570

  • SSDEEP

    1536:gqAd5Kb70H+wPcbHS4pNGLsmYTQs/0SoOejxZUdAP7w+MeHEsMW9+/iC999e0T:3we494YYnQ/nOcWdwbkE4/V

Malware Config

Extracted

Family

pony

C2

http://tjrtruj.pw:4915/doc/black.php

http://mtfaudj.pw:888/doc/black.php

Attributes
  • payload_url

    http://fkewryu.pw:888/pic/Flash.exe

Targets

    • Target

      25749a534879f530f35f5c46415695cc8339ae8b2b6ed38f722e67e8d946051aN.exe

    • Size

      98KB

    • MD5

      9524706d11a0d0221ff6a5883a08bf10

    • SHA1

      f80c11da234f43f04e80604f01e7e9867e401c1c

    • SHA256

      25749a534879f530f35f5c46415695cc8339ae8b2b6ed38f722e67e8d946051a

    • SHA512

      805c428b32a3d4fe76481790ce76fb1276d9ce74735d27c1f9651d983aa330ca10e4b5779501541da7318445ef0f6effac9b8b1a94154dfb0308d2d893c74570

    • SSDEEP

      1536:gqAd5Kb70H+wPcbHS4pNGLsmYTQs/0SoOejxZUdAP7w+MeHEsMW9+/iC999e0T:3we494YYnQ/nOcWdwbkE4/V

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks