General

  • Target

    f355a15832664c6936c094fe14285c53cae5cbdfe7c28042fb332dfc9f080063N.exe

  • Size

    385KB

  • Sample

    241202-2mmvpasngk

  • MD5

    bc95da27d66bd5a623be7574fd6ddc40

  • SHA1

    4c5a44f5c33e1d3f9b5518ea1dc07ae3118b1555

  • SHA256

    f355a15832664c6936c094fe14285c53cae5cbdfe7c28042fb332dfc9f080063

  • SHA512

    899096310c749e8ce2c52534dc6e98b1f3fc5784cfb24d452b6f6178d9704a5801e09559e4a4ff32a478f4454d47b289485103a51e1fb47553d29045d4b67c51

  • SSDEEP

    6144:T1/hg3rmC3NEt5/cUe9FUFX5Yjjpn+uIGRzDPdfwJJEN:43rmC3NE//cUe9Fwi7B

Malware Config

Extracted

Family

pony

C2

http://hedattoftle.ru/gate.php

http://fordahecbet.ru/gate.php

http://uttejustrep.ru/gate.php

Attributes
  • payload_url

    http://sanpham.techpal.vn/k1.exe

    http://www.koyundengelsin.com/k1.exe

    http://baafpack.com/k1.exe

Targets

    • Target

      f355a15832664c6936c094fe14285c53cae5cbdfe7c28042fb332dfc9f080063N.exe

    • Size

      385KB

    • MD5

      bc95da27d66bd5a623be7574fd6ddc40

    • SHA1

      4c5a44f5c33e1d3f9b5518ea1dc07ae3118b1555

    • SHA256

      f355a15832664c6936c094fe14285c53cae5cbdfe7c28042fb332dfc9f080063

    • SHA512

      899096310c749e8ce2c52534dc6e98b1f3fc5784cfb24d452b6f6178d9704a5801e09559e4a4ff32a478f4454d47b289485103a51e1fb47553d29045d4b67c51

    • SSDEEP

      6144:T1/hg3rmC3NEt5/cUe9FUFX5Yjjpn+uIGRzDPdfwJJEN:43rmC3NE//cUe9Fwi7B

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks