General

  • Target

    6ef1d80fb72ccd3f5ebaa23250c0449c5f03b64e9eb9bd754bad926276ae3840N.exe

  • Size

    70KB

  • Sample

    241216-nwzzqazpbl

  • MD5

    e5a6fbed5973d4a4d8f72b82f80ac470

  • SHA1

    c2c7000c30b5dcd78cfba6f2a8f6b7df94b21428

  • SHA256

    6ef1d80fb72ccd3f5ebaa23250c0449c5f03b64e9eb9bd754bad926276ae3840

  • SHA512

    c28f493f30b25055e7e95e06de83afc6400e7e7e73c3b0dfa6de21785e5b32ccf28f9dedc735e934af07164b9cc1a0a4bcd9ff2003c53b4eda59a9cde9c57c33

  • SSDEEP

    1536:0ymUWV/OcZiYD/EQT8P3KfOgc+M6mLe+MkZACHKXX1iiHhIn6OaH3KtZQ:QA+M6mLeNkZjK1iiHUkKtZQ

Malware Config

Extracted

Family

pony

C2

http://mmbild.se/mary/r1.php

http://plndigital.org/r1.php

Attributes
  • payload_url

    http://brettsplus.com.au/tmp/file1.exe

    http://brettsplus.com.au/tmp/file2.exe

    http://digitalimagellc.us/tmp/file1.exe

    http://digitalimagellc.us/tmp/file2.exe

Targets

    • Target

      6ef1d80fb72ccd3f5ebaa23250c0449c5f03b64e9eb9bd754bad926276ae3840N.exe

    • Size

      70KB

    • MD5

      e5a6fbed5973d4a4d8f72b82f80ac470

    • SHA1

      c2c7000c30b5dcd78cfba6f2a8f6b7df94b21428

    • SHA256

      6ef1d80fb72ccd3f5ebaa23250c0449c5f03b64e9eb9bd754bad926276ae3840

    • SHA512

      c28f493f30b25055e7e95e06de83afc6400e7e7e73c3b0dfa6de21785e5b32ccf28f9dedc735e934af07164b9cc1a0a4bcd9ff2003c53b4eda59a9cde9c57c33

    • SSDEEP

      1536:0ymUWV/OcZiYD/EQT8P3KfOgc+M6mLe+MkZACHKXX1iiHhIn6OaH3KtZQ:QA+M6mLeNkZjK1iiHUkKtZQ

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks