General

  • Target

    2a31e7a08fa73ff5cd6cd26345bff36b126e5d69ec45cc44d5693a8cc3526858.exe

  • Size

    114KB

  • Sample

    250108-pw91cszndy

  • MD5

    de23e291635c8c19bfefcc565d4cb60c

  • SHA1

    55cdd81fa83596abf2ed2cf670c9c3ed3ec2025e

  • SHA256

    2a31e7a08fa73ff5cd6cd26345bff36b126e5d69ec45cc44d5693a8cc3526858

  • SHA512

    9ec010a7c0c81185e33587e951afd8b1574735d2f65988a14ac83bbc414e4742fc89d8b14dd28c399f00888bb2a9179c288e889ce1c4a60ee785c71b163abda2

  • SSDEEP

    3072:qsK+rwdtMXA/v2Y9Vv7rzFww9HvpVzmagdm0XupUZK17IKb:qsK5dwM2YFjFwwPXzg00eu817IKb

Malware Config

Targets

    • Target

      2a31e7a08fa73ff5cd6cd26345bff36b126e5d69ec45cc44d5693a8cc3526858.exe

    • Size

      114KB

    • MD5

      de23e291635c8c19bfefcc565d4cb60c

    • SHA1

      55cdd81fa83596abf2ed2cf670c9c3ed3ec2025e

    • SHA256

      2a31e7a08fa73ff5cd6cd26345bff36b126e5d69ec45cc44d5693a8cc3526858

    • SHA512

      9ec010a7c0c81185e33587e951afd8b1574735d2f65988a14ac83bbc414e4742fc89d8b14dd28c399f00888bb2a9179c288e889ce1c4a60ee785c71b163abda2

    • SSDEEP

      3072:qsK+rwdtMXA/v2Y9Vv7rzFww9HvpVzmagdm0XupUZK17IKb:qsK5dwM2YFjFwwPXzg00eu817IKb

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks