General
-
Target
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738
-
Size
113KB
-
Sample
220919-1grq1sade9
-
MD5
7790d0c73e72404d5aefb37be44f2af9
-
SHA1
26de358806852f608d20419c938fb1ad61ae761c
-
SHA256
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738
-
SHA512
5055b46b21ce455006c0412201f5aaba1eb184a1a90ac0970cfbe42bedb0499d6400519f087a3f3f554610809c4a9ef596a33c535112a958974e0cd10b161315
-
SSDEEP
3072:kTY7VKne/pGXIvDbKfn4YO6P6morL3Atm3TJ7:sgVH/NbbKfTHtm3TJ7
Behavioral task
behavioral1
Sample
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
pony
http://sam-latrilogie.com:8080/pony/gate.php
http://loceanic.fr:8080/pony/gate.php
-
payload_url
http://propasmanagement.com/qTNc.exe
http://toffanoseventos.com.br/EFcT.exe
http://www.graficasalli.com.br/AqnAaH.exe
Targets
-
-
Target
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738
-
Size
113KB
-
MD5
7790d0c73e72404d5aefb37be44f2af9
-
SHA1
26de358806852f608d20419c938fb1ad61ae761c
-
SHA256
6ea4fe3a83f1f48873bb07c52f837a766d42b6d27d4db2a7dd08798a21bd2738
-
SHA512
5055b46b21ce455006c0412201f5aaba1eb184a1a90ac0970cfbe42bedb0499d6400519f087a3f3f554610809c4a9ef596a33c535112a958974e0cd10b161315
-
SSDEEP
3072:kTY7VKne/pGXIvDbKfn4YO6P6morL3Atm3TJ7:sgVH/NbbKfTHtm3TJ7
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-