General
-
Target
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a
-
Size
86KB
-
Sample
220731-hx1dzsdhb6
-
MD5
a3bd9be795f3bb86cc5f9cfdafe63174
-
SHA1
1e74684bdbafb21b4a742ab436f2372dd87e2c10
-
SHA256
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a
-
SHA512
7220c614c7d42f563e0d9777a4dd8023430e53eb4aa3e260668545999051f46ea64a267694da734cba553a4716923b72d5d74867014211a744faf064f23a23f7
Static task
static1
Behavioral task
behavioral1
Sample
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
pony
http://spiko2004.ru/api/index.php
Targets
-
-
Target
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a
-
Size
86KB
-
MD5
a3bd9be795f3bb86cc5f9cfdafe63174
-
SHA1
1e74684bdbafb21b4a742ab436f2372dd87e2c10
-
SHA256
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a
-
SHA512
7220c614c7d42f563e0d9777a4dd8023430e53eb4aa3e260668545999051f46ea64a267694da734cba553a4716923b72d5d74867014211a744faf064f23a23f7
-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-