General

  • Target

    ec9eac57a9388212231c096ada8d5d94ccef57859b144f07e82ea61a255830e7.exe

  • Size

    134KB

  • Sample

    250109-fbet2s1nbr

  • MD5

    d599625c7d9ebe39dddb0f9fd30ad54d

  • SHA1

    a5fc59976d95ab8ba1bec2b5281b9aa18c5f2c53

  • SHA256

    ec9eac57a9388212231c096ada8d5d94ccef57859b144f07e82ea61a255830e7

  • SHA512

    ffd66b6ba82282238cf4ccd42a4e81db463d17936ae8c4a77f3f18d2c67389d58607bbb5b004691291101896b1ae1df5eb72d8401330d9de72b2e9bd44b05c44

  • SSDEEP

    1536:v6sMEBSeN37FeG+TV7DMskVa1Q2I1n3HxfpxexY8cW7wDJGrtUhbhfgevvTZ2Q8+:ysM5fQ2I1nBx6L7wNIkfJnIQdUXincMv

Malware Config

Extracted

Family

pony

C2

http://116.122.158.195:8080/forum/viewtopic.php

http://mail.yaklasim.com:8080/forum/viewtopic.php

http://internationalmasterfranchises.com/forum/viewtopic.php

http://mattriordan.com/forum/viewtopic.php

Attributes
  • payload_url

    http://dtwassociates.com/Aapa.exe

    http://dreamworldhospitality.com/0Fb.exe

    http://pbmm.de/uZ2V607s.exe

    http://repro2go.com/Zn0R25r7.exe

Targets

    • Target

      ec9eac57a9388212231c096ada8d5d94ccef57859b144f07e82ea61a255830e7.exe

    • Size

      134KB

    • MD5

      d599625c7d9ebe39dddb0f9fd30ad54d

    • SHA1

      a5fc59976d95ab8ba1bec2b5281b9aa18c5f2c53

    • SHA256

      ec9eac57a9388212231c096ada8d5d94ccef57859b144f07e82ea61a255830e7

    • SHA512

      ffd66b6ba82282238cf4ccd42a4e81db463d17936ae8c4a77f3f18d2c67389d58607bbb5b004691291101896b1ae1df5eb72d8401330d9de72b2e9bd44b05c44

    • SSDEEP

      1536:v6sMEBSeN37FeG+TV7DMskVa1Q2I1n3HxfpxexY8cW7wDJGrtUhbhfgevvTZ2Q8+:ysM5fQ2I1nBx6L7wNIkfJnIQdUXincMv

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks