General
-
Target
f9afff41ed863c356c43cc6d8f3fd13ff6fec4fc5bcb6ad3e3822ac13a8fda2a
-
Size
97KB
-
Sample
221020-xwpy7aahbn
-
MD5
96f83a6611d7732c44966946554f9280
-
SHA1
f1da1341783bd60c3d30b78528e63b642d42d9dd
-
SHA256
f9afff41ed863c356c43cc6d8f3fd13ff6fec4fc5bcb6ad3e3822ac13a8fda2a
-
SHA512
447be25e5112ab1122e329a8a5ae6332b0a58865ef72988d121114b21ecc199cfc92ad17b8097e9b4484f452862584e2f4fb63a6d836ab6c5beb1f2d09d632b1
-
SSDEEP
3072:1OIkQqfJOXR4G5HlRZ0RIioWOzhK+SGAnX1s36v47NK:1xkXfJORp5PmmvRtKt/luh
Static task
static1
Behavioral task
behavioral1
Sample
f9afff41ed863c356c43cc6d8f3fd13ff6fec4fc5bcb6ad3e3822ac13a8fda2a.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://kurtst.pw:4915/doc/black.php
http://kurtst.pw:888/doc/black.php
-
payload_url
http://kytrus.pw:888/pic/Flash.exe
Targets
-
-
Target
f9afff41ed863c356c43cc6d8f3fd13ff6fec4fc5bcb6ad3e3822ac13a8fda2a
-
Size
97KB
-
MD5
96f83a6611d7732c44966946554f9280
-
SHA1
f1da1341783bd60c3d30b78528e63b642d42d9dd
-
SHA256
f9afff41ed863c356c43cc6d8f3fd13ff6fec4fc5bcb6ad3e3822ac13a8fda2a
-
SHA512
447be25e5112ab1122e329a8a5ae6332b0a58865ef72988d121114b21ecc199cfc92ad17b8097e9b4484f452862584e2f4fb63a6d836ab6c5beb1f2d09d632b1
-
SSDEEP
3072:1OIkQqfJOXR4G5HlRZ0RIioWOzhK+SGAnX1s36v47NK:1xkXfJORp5PmmvRtKt/luh
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-