{ "Event": { "analysis": "2", "date": "2017-02-07", "extends_uuid": "", "info": "OSINT - When A Pony Walks Out Of A Pub", "publish_timestamp": "1487952038", "published": true, "threat_level_id": "3", "timestamp": "1487927797", "uuid": "58996c01-5948-4776-bc9f-4216950d210f", "Orgc": { "name": "CIRCL", "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f" }, "Tag": [ { "colour": "#ffffff", "name": "tlp:white" } ], "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449936", "to_ids": false, "type": "link", "uuid": "58996c22-8218-4d72-8cbd-43a3950d210f", "value": "http://blog.talosintel.com/2017/02/pony-pub-files.html", "Tag": [ { "colour": "#00223b", "name": "osint:source-type=\"blog-post\"" }, { "colour": "#075200", "name": "admiralty-scale:source-reliability=\"b\"" } ] }, { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449715", "to_ids": false, "type": "text", "uuid": "58996c33-13ac-492f-a3b9-46dc950d210f", "value": "Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications within the Microsoft Office suite, Microsoft Publisher does not support a 'Protected View' mode. This is a read only mode which can help end users remain protected from malicious document files. Microsoft Publisher is included and installed by default in Office 365.\r\n\r\nThe file used in this campaign was aimed at infecting the victim with the, well known, Pony malware. Whilst Pony is well documented in technical capability it has not been known to use the .pub file format until now. Pony is a credential harvesting piece of malware with other trojan capabilities. In addition to credential harvesting, it is also commonly deployed as a malware loader and used to infect systems with additional malware in multi-stage infection chains. Pony is still used heavily as the sources of multiple Pony versions leaked thus making it much easier for other malicious actors to implement Pony into their infection chain." }, { "category": "Network activity", "comment": "payload", "deleted": false, "disable_correlation": false, "timestamp": "1486449761", "to_ids": true, "type": "url", "uuid": "58996c61-82f0-4dfb-b824-4d81950d210f", "value": "http://5.200.52.198/flex/3435dde3r.exe" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449762", "to_ids": true, "type": "url", "uuid": "58996c62-0b14-4823-a56c-4514950d210f", "value": "http://195.22.127.233/rec/fre.php" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449763", "to_ids": true, "type": "url", "uuid": "58996c63-ed10-4933-944c-4faf950d210f", "value": "http://kbfvzoboss.bid/alien/fre.php" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449764", "to_ids": true, "type": "url", "uuid": "58996c64-04fc-4b79-8555-4eb9950d210f", "value": "http://alphastand.win/alien/fre.php" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449765", "to_ids": true, "type": "url", "uuid": "58996c65-6cec-47fc-b053-48f3950d210f", "value": "http://alphastand.top/alien/fre.php" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449766", "to_ids": true, "type": "url", "uuid": "58996c66-5c50-4199-9592-4da3950d210f", "value": "http://alphastand.trade/alien/fre.php" }, { "category": "Network activity", "comment": "Pony CC", "deleted": false, "disable_correlation": false, "timestamp": "1486449767", "to_ids": true, "type": "url", "uuid": "58996c67-5324-4a23-a81f-4fc3950d210f", "value": "http://195.22.127.233:80/rec/fre.php" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449768", "to_ids": true, "type": "ip-dst", "uuid": "58996c68-d6d8-4822-9a30-4e32950d210f", "value": "5.200.52.198" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449769", "to_ids": true, "type": "ip-dst", "uuid": "58996c69-80d0-4ecb-9a50-4d4f950d210f", "value": "195.22.127.233" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449770", "to_ids": true, "type": "domain", "uuid": "58996c6a-0478-4c6a-9227-403a950d210f", "value": "kbfvzoboss.bid" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449770", "to_ids": true, "type": "domain", "uuid": "58996c6a-3940-4317-bd3e-4e5c950d210f", "value": "alphastand.win" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449771", "to_ids": true, "type": "domain", "uuid": "58996c6b-d2f4-4906-ae76-4e1f950d210f", "value": "alphastand.top" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1486449772", "to_ids": true, "type": "domain", "uuid": "58996c6c-257c-47ee-a443-4984950d210f", "value": "alphastand.trade" }, { "category": "Payload delivery", "comment": "skbmt_fax45.pub", "deleted": false, "disable_correlation": false, "timestamp": "1486449833", "to_ids": true, "type": "sha256", "uuid": "58996ca9-42a4-4d3d-bed6-4fe0950d210f", "value": "3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29" }, { "category": "Payload delivery", "comment": "skbmt_faxreport34.pub", "deleted": false, "disable_correlation": false, "timestamp": "1486449834", "to_ids": true, "type": "sha256", "uuid": "58996caa-2898-4e2a-b3f3-4aa3950d210f", "value": "36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed" }, { "category": "Payload delivery", "comment": "letten.js", "deleted": false, "disable_correlation": false, "timestamp": "1486449835", "to_ids": true, "type": "sha256", "uuid": "58996cab-69d4-42c5-8483-42e5950d210f", "value": "42d0990daba69fa5068a6910d0eac487f3d308ce7e28799a959dace8d84125d7" }, { "category": "Payload delivery", "comment": "payload", "deleted": false, "disable_correlation": false, "timestamp": "1486449835", "to_ids": true, "type": "sha256", "uuid": "58996cab-b9d4-48e3-84c5-4870950d210f", "value": "d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122" }, { "category": "Payload delivery", "comment": "payload", "deleted": false, "disable_correlation": false, "timestamp": "1486449836", "to_ids": true, "type": "sha256", "uuid": "58996cac-0e60-42b7-a43f-4814950d210f", "value": "c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991" }, { "category": "Payload delivery", "comment": "payload - Xchecked via VT: c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991", "deleted": false, "disable_correlation": false, "timestamp": "1486449912", "to_ids": true, "type": "sha1", "uuid": "58996cf8-bc7c-4413-bff0-4a1d02de0b81", "value": "b7e499be525b14b6801db2795ed631fbea7ca0bd" }, { "category": "Payload delivery", "comment": "payload - Xchecked via VT: c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991", "deleted": false, "disable_correlation": false, "timestamp": "1486449913", "to_ids": true, "type": "md5", "uuid": "58996cf9-51d4-4ad8-bc37-45d102de0b81", "value": "05c6208f08108266ab20eedd464fb05f" }, { "category": "External analysis", "comment": "payload - Xchecked via VT: c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991", "deleted": false, "disable_correlation": false, "timestamp": "1487927797", "to_ids": false, "type": "link", "uuid": "58996cf9-9a7c-40df-b751-444202de0b81", "value": "https://www.virustotal.com/file/c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991/analysis/1486387683/" }, { "category": "Payload delivery", "comment": "payload - Xchecked via VT: d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122", "deleted": false, "disable_correlation": false, "timestamp": "1486449914", "to_ids": true, "type": "sha1", "uuid": "58996cfa-64d4-402e-9ce3-4b7c02de0b81", "value": "a76b850aa336dfb5c83c50e83f24a9c844641684" }, { "category": "Payload delivery", "comment": "payload - Xchecked via VT: d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122", "deleted": false, "disable_correlation": false, "timestamp": "1486449915", "to_ids": true, "type": "md5", "uuid": "58996cfb-6388-411b-a740-41a302de0b81", "value": "9da66a7cf195036cb90606ef106e2234" }, { "category": "External analysis", "comment": "payload - Xchecked via VT: d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122", "deleted": false, "disable_correlation": false, "timestamp": "1486449916", "to_ids": false, "type": "link", "uuid": "58996cfc-d058-4024-a0de-47cb02de0b81", "value": "https://www.virustotal.com/file/d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122/analysis/1486116167/" }, { "category": "Payload delivery", "comment": "skbmt_faxreport34.pub - Xchecked via VT: 36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed", "deleted": false, "disable_correlation": false, "timestamp": "1486449916", "to_ids": true, "type": "sha1", "uuid": "58996cfc-e528-414d-b766-44ec02de0b81", "value": "9eb47a9bd943afe83c8bbc29669702dfa6db8e18" }, { "category": "Payload delivery", "comment": "skbmt_faxreport34.pub - Xchecked via VT: 36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed", "deleted": false, "disable_correlation": false, "timestamp": "1486449917", "to_ids": true, "type": "md5", "uuid": "58996cfd-1d94-41fd-9cca-41e102de0b81", "value": "05b8b570dcc6c78f26ede9f6f650097e" }, { "category": "External analysis", "comment": "skbmt_faxreport34.pub - Xchecked via VT: 36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed", "deleted": false, "disable_correlation": false, "timestamp": "1486449918", "to_ids": false, "type": "link", "uuid": "58996cfe-2598-4470-b1cf-4c8702de0b81", "value": "https://www.virustotal.com/file/36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed/analysis/1486424559/" }, { "category": "Payload delivery", "comment": "skbmt_fax45.pub - Xchecked via VT: 3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29", "deleted": false, "disable_correlation": false, "timestamp": "1486449919", "to_ids": true, "type": "sha1", "uuid": "58996cff-b21c-4734-8788-41d702de0b81", "value": "73a9c0054b193703960828808249a77840311bdf" }, { "category": "Payload delivery", "comment": "skbmt_fax45.pub - Xchecked via VT: 3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29", "deleted": false, "disable_correlation": false, "timestamp": "1486449920", "to_ids": true, "type": "md5", "uuid": "58996d00-f794-49a3-98ac-481c02de0b81", "value": "6208d08cfb09bae085f2eaeb53c17707" }, { "category": "External analysis", "comment": "skbmt_fax45.pub - Xchecked via VT: 3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29", "deleted": false, "disable_correlation": false, "timestamp": "1486449920", "to_ids": false, "type": "link", "uuid": "58996d00-630c-4917-a08e-4b8e02de0b81", "value": "https://www.virustotal.com/file/3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29/analysis/1486365572/" } ] } }