General
-
Target
de63f1e9ac97f6be5c9b02d80dc38665717d6483fdbd9778dfb3b4956683bc84
-
Size
227KB
-
Sample
221001-3xnqeacfb2
-
MD5
048a199311fab7f94c4875efa1dbd7ae
-
SHA1
c12904c11f04a09dea4fe96f4f7bfbab0fb69599
-
SHA256
de63f1e9ac97f6be5c9b02d80dc38665717d6483fdbd9778dfb3b4956683bc84
-
SHA512
7888f1b5d7a2fbcf61f1f0430f8420271d58327b92861a1ec01a86b57cec0f05fc81385d7a1998d93f780ace94f38ba3812e0faa88cdd2f215e9206b899ed7b9
-
SSDEEP
3072:ghMU1v4n8NTCNlMNG7rgRyD2TLimejD22u/lbtlRkE82hQP67V98KLd:ghMgt622ob6nuZ
Static task
static1
Behavioral task
behavioral1
Sample
de63f1e9ac97f6be5c9b02d80dc38665717d6483fdbd9778dfb3b4956683bc84.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://www.frankyzulike.org.in/ambrose/gate.php
Targets
-
-
Target
de63f1e9ac97f6be5c9b02d80dc38665717d6483fdbd9778dfb3b4956683bc84
-
Size
227KB
-
MD5
048a199311fab7f94c4875efa1dbd7ae
-
SHA1
c12904c11f04a09dea4fe96f4f7bfbab0fb69599
-
SHA256
de63f1e9ac97f6be5c9b02d80dc38665717d6483fdbd9778dfb3b4956683bc84
-
SHA512
7888f1b5d7a2fbcf61f1f0430f8420271d58327b92861a1ec01a86b57cec0f05fc81385d7a1998d93f780ace94f38ba3812e0faa88cdd2f215e9206b899ed7b9
-
SSDEEP
3072:ghMU1v4n8NTCNlMNG7rgRyD2TLimejD22u/lbtlRkE82hQP67V98KLd:ghMgt622ob6nuZ
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-