General

  • Target

    a2de24d8171cf779fc56f7dd9e2ff9f241c37bc513d95ccc1578c00c5ae2045e.exe

  • Size

    143KB

  • Sample

    241209-c6a8katkbr

  • MD5

    c7ebae16436a494299d48ab22f6c4ece

  • SHA1

    3b13232e10ea0b974d11dfaae4861cfff8b44b12

  • SHA256

    a2de24d8171cf779fc56f7dd9e2ff9f241c37bc513d95ccc1578c00c5ae2045e

  • SHA512

    82a6fc17e2e685ed1495616efc0cbc44ef507a8bdbcd9a01e6e6bf2909adc8ad4d57e1db4d0dc240ba4992cf1cd985873d727a846fa7e0bfe4c7930808916410

  • SSDEEP

    1536:buIzSzeI5V/tKAdM0jRU/u3yYb6kBZSqCDIUJdwdiaDltIxxnMepL3BaHs+qlJ76:vEeoV/cAy4xZgV/6IxagSo74KYp

Malware Config

Extracted

Family

pony

C2

http://www.scoopcelebrity.com/mobiledummy/wp-content/plugins/wordpress-seo/admin/linkdex/external.php

http://www.evokingyou.com/fashion/wp-content/themes/twentyeleven/inc/external.php

http://forums.lolapps.com/includes/cron/response.php

http://www.weallscheme.com/wp-content/uploads/2010/07/menu.php

http://www.kitchenaria.com/modules/gateway2/Protx/response.php

Targets

    • Target

      a2de24d8171cf779fc56f7dd9e2ff9f241c37bc513d95ccc1578c00c5ae2045e.exe

    • Size

      143KB

    • MD5

      c7ebae16436a494299d48ab22f6c4ece

    • SHA1

      3b13232e10ea0b974d11dfaae4861cfff8b44b12

    • SHA256

      a2de24d8171cf779fc56f7dd9e2ff9f241c37bc513d95ccc1578c00c5ae2045e

    • SHA512

      82a6fc17e2e685ed1495616efc0cbc44ef507a8bdbcd9a01e6e6bf2909adc8ad4d57e1db4d0dc240ba4992cf1cd985873d727a846fa7e0bfe4c7930808916410

    • SSDEEP

      1536:buIzSzeI5V/tKAdM0jRU/u3yYb6kBZSqCDIUJdwdiaDltIxxnMepL3BaHs+qlJ76:vEeoV/cAy4xZgV/6IxagSo74KYp

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks