General
-
Target
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404
-
Size
132KB
-
Sample
221001-ysc1wsefdq
-
MD5
62cf78dd6c7696f68b30154ba3383980
-
SHA1
520b50b3e27ca1c6174267a89bec6a8998d6bccb
-
SHA256
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404
-
SHA512
6f6bd4989b9abe9d92d0d9bb0808bb48bb1afb1cd126cf0f6dbdc4a6f2a028fda60de3004348f2a17ff80c23b290a80664f423d30eda62c8c6fc99e4a9fb2363
-
SSDEEP
3072:vkhPq4wLH98YBAvW7H87DtjIuG4CXcGtVok8LVYj4uS98hrT9:A87+YBWW7QDtjI1VXchLVYj4uSS
Static task
static1
Behavioral task
behavioral1
Sample
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/ponyb/gate.php
http://grupoent.com/ponyb/gate.php
http://enteratecalifornia.com/ponyb/gate.php
http://ignaciomoreno.com/ponyb/gate.php
-
payload_url
http://dp26022227.lolipop.jp/7ynx4.exe
http://zetaliterature.com/3oSZrb.exe
http://ihlwholesale.com/a0Ry9FoQ.exe
http://dp55197480.lolipop.jp/ZiFg.exe
Targets
-
-
Target
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404
-
Size
132KB
-
MD5
62cf78dd6c7696f68b30154ba3383980
-
SHA1
520b50b3e27ca1c6174267a89bec6a8998d6bccb
-
SHA256
f1ed64b7b6cdfb765636b7b74e330ba472da36db170ede96272a989533d4d404
-
SHA512
6f6bd4989b9abe9d92d0d9bb0808bb48bb1afb1cd126cf0f6dbdc4a6f2a028fda60de3004348f2a17ff80c23b290a80664f423d30eda62c8c6fc99e4a9fb2363
-
SSDEEP
3072:vkhPq4wLH98YBAvW7H87DtjIuG4CXcGtVok8LVYj4uS98hrT9:A87+YBWW7QDtjI1VXchLVYj4uSS
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-