General

  • Target

    124547f83ab768fc035b89169464a6ef4980d942c56091edc33a88e80ccf2dc0

  • Size

    365KB

  • Sample

    250108-ywyrrstnhm

  • MD5

    6bc1c351a6b80eb78be2bf037e40633c

  • SHA1

    e29069047eff77c15989c9e4bc7b84178e02cc33

  • SHA256

    124547f83ab768fc035b89169464a6ef4980d942c56091edc33a88e80ccf2dc0

  • SHA512

    79ce66487797871ec808ab8889cd37f514f7546c8a38fedc614918f507930c88c3c2ff7ec028040976ee4abb0569e4d99eb9fb39f24d30ba47e3684aad2bd2a2

  • SSDEEP

    6144:+0DfPmsNU0VauEuE9TmY8LAdu4Nu0dlZiJxnWcD/8KNSe6aKtE+2:b7PmFwauEuAmY8AtmxWcoKNSVaK12

Malware Config

Extracted

Family

pony

C2

http://dax.dnsalias.net:50/in/buy.php

http://multi.dnsalias.org:50/in/pay.php

Targets

    • Target

      124547f83ab768fc035b89169464a6ef4980d942c56091edc33a88e80ccf2dc0

    • Size

      365KB

    • MD5

      6bc1c351a6b80eb78be2bf037e40633c

    • SHA1

      e29069047eff77c15989c9e4bc7b84178e02cc33

    • SHA256

      124547f83ab768fc035b89169464a6ef4980d942c56091edc33a88e80ccf2dc0

    • SHA512

      79ce66487797871ec808ab8889cd37f514f7546c8a38fedc614918f507930c88c3c2ff7ec028040976ee4abb0569e4d99eb9fb39f24d30ba47e3684aad2bd2a2

    • SSDEEP

      6144:+0DfPmsNU0VauEuE9TmY8LAdu4Nu0dlZiJxnWcD/8KNSe6aKtE+2:b7PmFwauEuAmY8AtmxWcoKNSVaK12

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks