General

  • Target

    fe2a3cf01e8347a4b109a0541bbcd63a7fbf68c08a4f7536e820800df87c7684N.exe

  • Size

    113KB

  • Sample

    241204-k9n8la1mez

  • MD5

    b53a5f2f9e551e3f54a2017d32c6edf0

  • SHA1

    c3196cea63bea602bd9974fd51c23eb5778baeab

  • SHA256

    fe2a3cf01e8347a4b109a0541bbcd63a7fbf68c08a4f7536e820800df87c7684

  • SHA512

    b3105c463065144703babd911a5d99564ef9b54d17ad36a6406ba7300be89da786b0180faf3b6b337d58e6a35f9b026c48f422d70f869ffc73798124e8fabee9

  • SSDEEP

    1536:HCW3sBK3avjaHyimb4lpXlz/AoJut3pdTrjlpVMJ+XbwDotizl7D4tjU:Hj3SK3aLaHppVz/vuDT9piJ1zl34tjU

Malware Config

Extracted

Family

pony

C2

http://hitechcreature.com/forum/viewtopic.php

http://industryseeds.ca/forum/viewtopic.php

http://infocreature.com/forum/viewtopic.php

http://itanimal.com/forum/viewtopic.php

Attributes
  • payload_url

    http://www.reggaeband.de/3rx.exe

    http://gardelco.com/oaNhfFk.exe

    http://rfsystem.co.kr/uvGk4y.exe

    http://ftp.ronco.ca/spv5.exe

Targets

    • Target

      fe2a3cf01e8347a4b109a0541bbcd63a7fbf68c08a4f7536e820800df87c7684N.exe

    • Size

      113KB

    • MD5

      b53a5f2f9e551e3f54a2017d32c6edf0

    • SHA1

      c3196cea63bea602bd9974fd51c23eb5778baeab

    • SHA256

      fe2a3cf01e8347a4b109a0541bbcd63a7fbf68c08a4f7536e820800df87c7684

    • SHA512

      b3105c463065144703babd911a5d99564ef9b54d17ad36a6406ba7300be89da786b0180faf3b6b337d58e6a35f9b026c48f422d70f869ffc73798124e8fabee9

    • SSDEEP

      1536:HCW3sBK3avjaHyimb4lpXlz/AoJut3pdTrjlpVMJ+XbwDotizl7D4tjU:Hj3SK3aLaHppVz/vuDT9piJ1zl34tjU

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks