General
-
Target
53622b8898937072e67d11ea5224d5f78cfb9f23a61d1a076a14519f77e46f08
-
Size
269KB
-
Sample
221030-h34nlaaadn
-
MD5
57a8e8164abfa421719eaabf5b6724d0
-
SHA1
56bd47864f4fca9ab8005365262aa16148366cd2
-
SHA256
53622b8898937072e67d11ea5224d5f78cfb9f23a61d1a076a14519f77e46f08
-
SHA512
b77f411cbd12b7d61453755bb831cfd785cd2cdedd520165427552f2199df410e6b92d39add6a43fee539dcae29536b42102feeebb176cd6ea3575d23131c193
-
SSDEEP
3072:bNxxryjRaR/wQkdKq/8cPoEOMlE/3H/QDjpt7cuwBCi1BHHBFobHbEzVa8/RX4P/:bEjRV/84obRffs7UCi8zbE1+
Static task
static1
Behavioral task
behavioral1
Sample
53622b8898937072e67d11ea5224d5f78cfb9f23a61d1a076a14519f77e46f08.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://bosconova.com/mcs/gate.php
Targets
-
-
Target
53622b8898937072e67d11ea5224d5f78cfb9f23a61d1a076a14519f77e46f08
-
Size
269KB
-
MD5
57a8e8164abfa421719eaabf5b6724d0
-
SHA1
56bd47864f4fca9ab8005365262aa16148366cd2
-
SHA256
53622b8898937072e67d11ea5224d5f78cfb9f23a61d1a076a14519f77e46f08
-
SHA512
b77f411cbd12b7d61453755bb831cfd785cd2cdedd520165427552f2199df410e6b92d39add6a43fee539dcae29536b42102feeebb176cd6ea3575d23131c193
-
SSDEEP
3072:bNxxryjRaR/wQkdKq/8cPoEOMlE/3H/QDjpt7cuwBCi1BHHBFobHbEzVa8/RX4P/:bEjRV/84obRffs7UCi8zbE1+
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-