General

  • Target

    0450c7e6c413a63af47c0474a8a8f8e0c63c5acdf098b8e619f437d0cf4d829c

  • Size

    64KB

  • Sample

    241201-r3t9layldj

  • MD5

    0ed7d62fc09814ce1f8f7b3b88b8a081

  • SHA1

    6a13bc929eea9d9b0b11478cd2b29386b1df5d37

  • SHA256

    0450c7e6c413a63af47c0474a8a8f8e0c63c5acdf098b8e619f437d0cf4d829c

  • SHA512

    60e811bb27be4105348041a1f0e70ac9be85c29c9d291dc3c928483da3f9b8a5c6f7f9f7093596987012fa6d58ed7bf85d1b2bd537a29060b9259aef0132ab4b

  • SSDEEP

    1536:zzq+5hRpfv07XCH8mIahlh/EoP9fJtfG+v/kjC/ExN49ZPFfq8mJ:ECGahZJtfG+9E2ZPQ

Malware Config

Extracted

Family

pony

C2

http://criminallawdc.com/default.php?517MTyKXbA4pZuueQ1ay6Dgl2uEjau8yNh

http://1callalert.com/default.php?qA6UBcu6AjB8x9JqvOtC3aBFoTU5C21aEDB34

http://semtly.com/default.php?8xRRepn5vWSVMvIgKDkgQwCMvQZR6bUhD9vdP1U9P

http://choiceonesupport.org/default.php?iqsvP4dhnVk82neqFum1nvJU43HB8D6

http://e3pos.com/default.php?SltKWD44EdkECNMISztnGyO3arr5mRG6rjiVzFkw1V

Targets

    • Target

      0450c7e6c413a63af47c0474a8a8f8e0c63c5acdf098b8e619f437d0cf4d829c

    • Size

      64KB

    • MD5

      0ed7d62fc09814ce1f8f7b3b88b8a081

    • SHA1

      6a13bc929eea9d9b0b11478cd2b29386b1df5d37

    • SHA256

      0450c7e6c413a63af47c0474a8a8f8e0c63c5acdf098b8e619f437d0cf4d829c

    • SHA512

      60e811bb27be4105348041a1f0e70ac9be85c29c9d291dc3c928483da3f9b8a5c6f7f9f7093596987012fa6d58ed7bf85d1b2bd537a29060b9259aef0132ab4b

    • SSDEEP

      1536:zzq+5hRpfv07XCH8mIahlh/EoP9fJtfG+v/kjC/ExN49ZPFfq8mJ:ECGahZJtfG+9E2ZPQ

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks