General
-
Target
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab
-
Size
131KB
-
Sample
221004-br9xxafdek
-
MD5
66e576e9710bf812f3a27261215ae010
-
SHA1
d4fa35d565e83dbe734a97216c90d5f8cee034ca
-
SHA256
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab
-
SHA512
28732ecb9e12f6e5a2c0ecb5191905f65c75629a347837dda1aa20886b01ab3061e8a5458198e7592cbf18d2153ba74fd47224fe85b65ffc4667e43370ae019d
-
SSDEEP
3072:IwXO3d+BSlLasPkYIt//t3B2EQdwsEb/lGS:9OUSlLaYKL2EQdwpbcS
Static task
static1
Behavioral task
behavioral1
Sample
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/ponyz/gate.php
http://116.122.158.195:8080/ponyz/gate.php
http://hurricanestormsavings.com/ponyz/gate.php
http://hurricanestrengthsavings.com/ponyz/gate.php
-
payload_url
http://downloads-kunden.rescue.at/daD85j4T.exe
http://dreamworldhospitality.com/iUaoBB9.exe
http://connect-me.de/q2M.exe
Targets
-
-
Target
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab
-
Size
131KB
-
MD5
66e576e9710bf812f3a27261215ae010
-
SHA1
d4fa35d565e83dbe734a97216c90d5f8cee034ca
-
SHA256
be7798f0170de45a3a02c5659ba982c13796a769947d42cf6caa46dd93c2e5ab
-
SHA512
28732ecb9e12f6e5a2c0ecb5191905f65c75629a347837dda1aa20886b01ab3061e8a5458198e7592cbf18d2153ba74fd47224fe85b65ffc4667e43370ae019d
-
SSDEEP
3072:IwXO3d+BSlLasPkYIt//t3B2EQdwsEb/lGS:9OUSlLaYKL2EQdwpbcS
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-