General
-
Target
D7430680C994BC488209AA05C2E72DE9FFE5D85811140.exe
-
Size
148KB
-
Sample
220624-fb8r5aceh5
-
MD5
d1f6d486c4afb6aca38ee45ed8ae4e3c
-
SHA1
3343a6203db587c257252d5b493ea16d5ac93e13
-
SHA256
d7430680c994bc488209aa05c2e72de9ffe5d858111404a2ffb7715bae4f0758
-
SHA512
634e77f6dc9ff159742cabb90d9c3ce62c5f392b96f2cb01b93d86989369e374e9a473327ece255fc784348e9c3ac710a9e18192b686fc3b264793470d36208d
Static task
static1
Behavioral task
behavioral1
Sample
D7430680C994BC488209AA05C2E72DE9FFE5D85811140.exe
Resource
win7-20220414-en
Malware Config
Extracted
pony
http://dinom.spb.ru/api/index.php
Targets
-
-
Target
D7430680C994BC488209AA05C2E72DE9FFE5D85811140.exe
-
Size
148KB
-
MD5
d1f6d486c4afb6aca38ee45ed8ae4e3c
-
SHA1
3343a6203db587c257252d5b493ea16d5ac93e13
-
SHA256
d7430680c994bc488209aa05c2e72de9ffe5d858111404a2ffb7715bae4f0758
-
SHA512
634e77f6dc9ff159742cabb90d9c3ce62c5f392b96f2cb01b93d86989369e374e9a473327ece255fc784348e9c3ac710a9e18192b686fc3b264793470d36208d
-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Fareit/Pony Downloader Checkin 2
suricata: ET MALWARE Fareit/Pony Downloader Checkin 2
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-