General

  • Target

    76f3cb449c2bdcc6f21b2414795e7280.exe

  • Size

    76KB

  • Sample

    250107-hfrqhs1kdj

  • MD5

    76f3cb449c2bdcc6f21b2414795e7280

  • SHA1

    5dc41c645eb28caafca06eb26d8a365f8a2b74d4

  • SHA256

    fa80a18efe1089b05bcb3e7a239b96fdf878863c761363e34dccc9c08974a9e2

  • SHA512

    bb615887bfd8d0320db41beaa20d6723b1f6e532d04c66db2adefd9b258c21477acae92080f91ada6c9be5b3774493d5340968482ffdfd70d3bcd909e6e8c9d1

  • SSDEEP

    1536:icOEtcILha8TjW4/1LpyF22C7CSxOtGC9ek8:vOwcILM8TqALAcRCSg4Oj

Malware Config

Extracted

Family

pony

C2

http://newlinkname.com/search.php

http://storestitch.com/blog/wp-rss.php

http://blogstrng.com/hotlink/imgs.php

http://blogstrng.com/hotlink/pic.php

Targets

    • Target

      76f3cb449c2bdcc6f21b2414795e7280.exe

    • Size

      76KB

    • MD5

      76f3cb449c2bdcc6f21b2414795e7280

    • SHA1

      5dc41c645eb28caafca06eb26d8a365f8a2b74d4

    • SHA256

      fa80a18efe1089b05bcb3e7a239b96fdf878863c761363e34dccc9c08974a9e2

    • SHA512

      bb615887bfd8d0320db41beaa20d6723b1f6e532d04c66db2adefd9b258c21477acae92080f91ada6c9be5b3774493d5340968482ffdfd70d3bcd909e6e8c9d1

    • SSDEEP

      1536:icOEtcILha8TjW4/1LpyF22C7CSxOtGC9ek8:vOwcILM8TqALAcRCSg4Oj

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks