General
-
Target
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327
-
Size
130KB
-
Sample
221001-2wa79aahg6
-
MD5
6ac997250cb68e664a4c66c5c9a7437b
-
SHA1
5135dfb1c422d6829847f83cf1bfcda95b8fd1e8
-
SHA256
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327
-
SHA512
6aaa867fa43c31046fc0667fbda30836a22d1f15830c2c7d18accb73b23dfa4da937e666ed08e717601d2ba40ec945223751029ee13397f31108f9c533b70e74
-
SSDEEP
3072:pg/hwokb84hFwpdLCqVAQ+H5mWSAsumQrb:nXY+apQquNZmWSxhQrb
Static task
static1
Behavioral task
behavioral1
Sample
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/ponyz/gate.php
http://116.122.158.195:8080/ponyz/gate.php
http://brewerstire.com/ponyz/gate.php
http://bridgewatertire.com/ponyz/gate.php
-
payload_url
http://downloads-kunden.rescue.at/daD85j4T.exe
http://dreamworldhospitality.com/iUaoBB9.exe
http://connect-me.de/q2M.exe
Targets
-
-
Target
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327
-
Size
130KB
-
MD5
6ac997250cb68e664a4c66c5c9a7437b
-
SHA1
5135dfb1c422d6829847f83cf1bfcda95b8fd1e8
-
SHA256
306bce8b18f46e5dac0ee2f5d38f1e51d25066bf0b6e77a97f733194e7152327
-
SHA512
6aaa867fa43c31046fc0667fbda30836a22d1f15830c2c7d18accb73b23dfa4da937e666ed08e717601d2ba40ec945223751029ee13397f31108f9c533b70e74
-
SSDEEP
3072:pg/hwokb84hFwpdLCqVAQ+H5mWSAsumQrb:nXY+apQquNZmWSxhQrb
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-