General

  • Target

    2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835.exe

  • Size

    372KB

  • Sample

    241208-cly4wswqev

  • MD5

    2fbfc79462b64751c339f0b0297c748f

  • SHA1

    3c07b52af2661e02e4db7dc978a83db0ba7c570f

  • SHA256

    2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835

  • SHA512

    dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827

  • SSDEEP

    3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg

Malware Config

Extracted

Family

pony

C2

http://6.magicalomaha.co/forum/viewtopic.php

http://6.magicalomaha.com/forum/viewtopic.php

Attributes
  • payload_url

    http://dynamotouren.de/4XM2f.exe

    http://app.bi.com.tr/fPFa.exe

    http://72.32.185.12/rd7nr.exe

    http://208.116.13.164/b6dK7rwV.exe

    http://www.seigner-art.at/fPsx8i.exe

    http://www.aboessen24.de/WWkULwkq.exe

Targets

    • Target

      2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835.exe

    • Size

      372KB

    • MD5

      2fbfc79462b64751c339f0b0297c748f

    • SHA1

      3c07b52af2661e02e4db7dc978a83db0ba7c570f

    • SHA256

      2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835

    • SHA512

      dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827

    • SSDEEP

      3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks