General
-
Target
1320-138-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
Sample
221111-1xxxzabh45
-
MD5
4bcd915be869cee80a82cfd52e0da2cf
-
SHA1
e1d638f466b4ef75aabd13cc98bd170990c03669
-
SHA256
6669fb961c61e3f9468a2955133a3693a2ae50f7850f798d8f15101f5ad18c65
-
SHA512
28fd9885421d70441fbf6cfd283aebeabf8700bc384f85ed4b8f24e1b7c2300632370c7738bef30590c21d80f197830e0bbd819567aa25945e5093a687f19798
-
SSDEEP
1536:nt2CUCAqTLDNEsVQYTnmCZih5+Q/Ty1zPPOjVz92Tv8E6/kzmmsB:t2elrn1ih5kO1pE6/msB
Behavioral task
behavioral1
Sample
1320-138-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1320-138-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
pony
http://berman77.webfactional.com/flash/rss.php
Targets
-
-
Target
1320-138-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
4bcd915be869cee80a82cfd52e0da2cf
-
SHA1
e1d638f466b4ef75aabd13cc98bd170990c03669
-
SHA256
6669fb961c61e3f9468a2955133a3693a2ae50f7850f798d8f15101f5ad18c65
-
SHA512
28fd9885421d70441fbf6cfd283aebeabf8700bc384f85ed4b8f24e1b7c2300632370c7738bef30590c21d80f197830e0bbd819567aa25945e5093a687f19798
-
SSDEEP
1536:nt2CUCAqTLDNEsVQYTnmCZih5+Q/Ty1zPPOjVz92Tv8E6/kzmmsB:t2elrn1ih5kO1pE6/msB
Score8/10 -