General
-
Target
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017
-
Size
120KB
-
Sample
221123-lrzgaacb42
-
MD5
bf64c727278d78862ffb11e287b3cea8
-
SHA1
50088179810d1e10678e728efe24d498ad485adf
-
SHA256
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017
-
SHA512
4117e63149dc30e8934cd1baa46198172d818679d6dd6ef1da1217d2865aa335b6a4b46ba1191e2c5386408a4391be5f9aa186b29c1d7865ca5a5caaa684036b
-
SSDEEP
1536:zAtvvI0f+RIg9CG5lsIlKMj0b7UADGyXuuWi3hUbPYIX+U:zAtv0RIg9CdcKMaiiuuWshBU
Static task
static1
Behavioral task
behavioral1
Sample
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://178.207.18.188:8080/pnn/404.php
-
payload_url
http://zusso.jp/444.exe
http://interativaonline.com/444.exe
http://elsy.pwp.blueyonder.co.uk/444.exe
Targets
-
-
Target
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017
-
Size
120KB
-
MD5
bf64c727278d78862ffb11e287b3cea8
-
SHA1
50088179810d1e10678e728efe24d498ad485adf
-
SHA256
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017
-
SHA512
4117e63149dc30e8934cd1baa46198172d818679d6dd6ef1da1217d2865aa335b6a4b46ba1191e2c5386408a4391be5f9aa186b29c1d7865ca5a5caaa684036b
-
SSDEEP
1536:zAtvvI0f+RIg9CG5lsIlKMj0b7UADGyXuuWi3hUbPYIX+U:zAtv0RIg9CdcKMaiiuuWshBU
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-