General
-
Target
866d920b3267ebb22bcc149e05c00c67e69a2ccb38322a2cda6f5cf1e558ac69
-
Size
479KB
-
Sample
221122-w5hqssch46
-
MD5
2836a201c24981c9de8bc9d67d6d1f61
-
SHA1
84f1c4e316268a13b1afe7fa57b36dde30693a97
-
SHA256
866d920b3267ebb22bcc149e05c00c67e69a2ccb38322a2cda6f5cf1e558ac69
-
SHA512
4ca2263aff3e8caf34f3535c69842acc37067b61404f847c368b0ebd2c3290cd6c95f4b0c32860eb5f04a287b5c8ef5127a4097e7b8fc7317abd11487dcf6101
-
SSDEEP
12288:T+zpYmo4xGcwEwcBX9TV021wRjB1whm8U:T+zpy+GcBwUX9TwrSm8U
Static task
static1
Behavioral task
behavioral1
Sample
866d920b3267ebb22bcc149e05c00c67e69a2ccb38322a2cda6f5cf1e558ac69.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://eileen.3eeweb.com/1/1/gate.php
Targets
-
-
Target
866d920b3267ebb22bcc149e05c00c67e69a2ccb38322a2cda6f5cf1e558ac69
-
Size
479KB
-
MD5
2836a201c24981c9de8bc9d67d6d1f61
-
SHA1
84f1c4e316268a13b1afe7fa57b36dde30693a97
-
SHA256
866d920b3267ebb22bcc149e05c00c67e69a2ccb38322a2cda6f5cf1e558ac69
-
SHA512
4ca2263aff3e8caf34f3535c69842acc37067b61404f847c368b0ebd2c3290cd6c95f4b0c32860eb5f04a287b5c8ef5127a4097e7b8fc7317abd11487dcf6101
-
SSDEEP
12288:T+zpYmo4xGcwEwcBX9TV021wRjB1whm8U:T+zpy+GcBwUX9TwrSm8U
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-