General

  • Target

    ed4a41dd2b7df709de737db8b7939a8c1c396ce96f26e2c1c5af7b02dc27a97eN.exe

  • Size

    147KB

  • Sample

    241216-px85fs1jbw

  • MD5

    ec82bce2f7a3fe6fd3fe17c7c05734d0

  • SHA1

    01245091bfe4c3a7adf2c39562184090a8d79c2a

  • SHA256

    ed4a41dd2b7df709de737db8b7939a8c1c396ce96f26e2c1c5af7b02dc27a97e

  • SHA512

    16ce54d687943f0ca7aabffec3efb630d7b62f6ff84dfc119f27dec2cac11b4877286f5888686dd5af28244acceffed29d4aa3a001455f59278f0b0a4859ad05

  • SSDEEP

    3072:z5Rfr1ZZpFhVpnYMGYhLUw8Ytgu/sT6mo4+DJpYkDl:z5tr5BVFYsxUwKTuHrD

Malware Config

Extracted

Family

pony

C2

http://78.159.97.29:8080/pony/gate.php

http://78.159.97.30:8080/pony/gate.php

Attributes
  • payload_url

    http://a-tak.nazwa.pl/vwpaLH.exe

    http://pcshopper.com.au/xPTy0T.exe

    http://procurement.citarum.org/yqWP.exe

Targets

    • Target

      ed4a41dd2b7df709de737db8b7939a8c1c396ce96f26e2c1c5af7b02dc27a97eN.exe

    • Size

      147KB

    • MD5

      ec82bce2f7a3fe6fd3fe17c7c05734d0

    • SHA1

      01245091bfe4c3a7adf2c39562184090a8d79c2a

    • SHA256

      ed4a41dd2b7df709de737db8b7939a8c1c396ce96f26e2c1c5af7b02dc27a97e

    • SHA512

      16ce54d687943f0ca7aabffec3efb630d7b62f6ff84dfc119f27dec2cac11b4877286f5888686dd5af28244acceffed29d4aa3a001455f59278f0b0a4859ad05

    • SSDEEP

      3072:z5Rfr1ZZpFhVpnYMGYhLUw8Ytgu/sT6mo4+DJpYkDl:z5tr5BVFYsxUwKTuHrD

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks