General
-
Target
82992542f37a4d188c69e394631b2c4aa634f7102bb371391e92ef2b26ec6383
-
Size
97KB
-
Sample
221120-j68bmadh47
-
MD5
5091ec3676e0f2a175c432530974f819
-
SHA1
02cd8250c2571e1d52ac3915d6d8c491374967a6
-
SHA256
82992542f37a4d188c69e394631b2c4aa634f7102bb371391e92ef2b26ec6383
-
SHA512
39d7f00332dd0e01907ac68089b1a61d96c7391a776e4a3a0e97c3f537bf4f4bbaae4cb3d041f60ddb71ca1ecc9bebbfa4be5675505266c6c82641f337041669
-
SSDEEP
3072:Jw4FkOXR4G5HdSGlX7s36W4eNIRZoRIBEOjhK7:JFkORp5QkuY1Wmp9K
Static task
static1
Behavioral task
behavioral1
Sample
82992542f37a4d188c69e394631b2c4aa634f7102bb371391e92ef2b26ec6383.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://kurtst.pw:4915/doc/black.php
http://kurtst.pw:888/doc/black.php
-
payload_url
http://kytrus.pw:888/pic/Flash.exe
Targets
-
-
Target
82992542f37a4d188c69e394631b2c4aa634f7102bb371391e92ef2b26ec6383
-
Size
97KB
-
MD5
5091ec3676e0f2a175c432530974f819
-
SHA1
02cd8250c2571e1d52ac3915d6d8c491374967a6
-
SHA256
82992542f37a4d188c69e394631b2c4aa634f7102bb371391e92ef2b26ec6383
-
SHA512
39d7f00332dd0e01907ac68089b1a61d96c7391a776e4a3a0e97c3f537bf4f4bbaae4cb3d041f60ddb71ca1ecc9bebbfa4be5675505266c6c82641f337041669
-
SSDEEP
3072:Jw4FkOXR4G5HdSGlX7s36W4eNIRZoRIBEOjhK7:JFkORp5QkuY1Wmp9K
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-