General
-
Target
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1
-
Size
128KB
-
Sample
221030-pw6ypscabm
-
MD5
a311e120ea1b41bd6177c278de466280
-
SHA1
77904814eb1fe51d367b504e816ab3801e4bf36d
-
SHA256
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1
-
SHA512
0127dc741cc56b843ca13f0c56cd724d62b0b7e1c45c9226a3d63cd7172b5c5cefe9c69076dc44ceeac372423eaad4314e59693f448d835b1ae0e7bfc763fb88
-
SSDEEP
3072:OSa5apKvbMM1NQrNM0L0oxs3XtKrlHOej1qCHVBqK/I7Y:/cNneSXt8HO8quVBqr
Static task
static1
Behavioral task
behavioral1
Sample
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/ponyz/gate.php
http://andlettherebelight.com/ponyz/gate.php
http://firepointmedia.net/ponyz/gate.php
http://graphicspecialistsgroup.com/ponyz/gate.php
-
payload_url
http://ryulawgroup.com/5KZbaG33.exe
http://text.sercominter.com/P5YUA.exe
http://eclay.netwiz.net/jsxxB.exe
Targets
-
-
Target
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1
-
Size
128KB
-
MD5
a311e120ea1b41bd6177c278de466280
-
SHA1
77904814eb1fe51d367b504e816ab3801e4bf36d
-
SHA256
7dc53fd4ae551ca1b3888139e32819c4b924aad7676312a1bc606cbb6912cca1
-
SHA512
0127dc741cc56b843ca13f0c56cd724d62b0b7e1c45c9226a3d63cd7172b5c5cefe9c69076dc44ceeac372423eaad4314e59693f448d835b1ae0e7bfc763fb88
-
SSDEEP
3072:OSa5apKvbMM1NQrNM0L0oxs3XtKrlHOej1qCHVBqK/I7Y:/cNneSXt8HO8quVBqr
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-