General
-
Target
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77
-
Size
119KB
-
Sample
221001-124lbahec8
-
MD5
4328a1ed7c8ecc6801edcce7c51a85fb
-
SHA1
9ca512264a89b6e451f6d6f2c73308e4ffb4eb49
-
SHA256
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77
-
SHA512
566e988d4b1cedeb5f901c75d581d2aa0d4e00f85b892e1c9d40ff93d49c04d26f2cdae88a238c4b073d90725ab93b5405c210d196436f8918b96f06bbffa7bd
-
SSDEEP
3072:87hdr+bkUAe6e7zPeJ2ntg5Qzx+MoqFtZ:SPr7je6qbtg5NqF
Static task
static1
Behavioral task
behavioral1
Sample
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
pony
http://1800callabe.com/ponyz/gate.php
http://1866callabe.com/ponyz/gate.php
http://abemoussa.com/ponyz/gate.php
http://abemuggs.com/ponyz/gate.php
-
payload_url
http://bluewebtech.co.za/bSe8t.exe
http://beary.us/KW7mcajw.exe
http://chuck.fanzoom.net/xoAbVd.exe
Targets
-
-
Target
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77
-
Size
119KB
-
MD5
4328a1ed7c8ecc6801edcce7c51a85fb
-
SHA1
9ca512264a89b6e451f6d6f2c73308e4ffb4eb49
-
SHA256
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77
-
SHA512
566e988d4b1cedeb5f901c75d581d2aa0d4e00f85b892e1c9d40ff93d49c04d26f2cdae88a238c4b073d90725ab93b5405c210d196436f8918b96f06bbffa7bd
-
SSDEEP
3072:87hdr+bkUAe6e7zPeJ2ntg5Qzx+MoqFtZ:SPr7je6qbtg5NqF
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-