General
-
Target
03ba732eb5d3a18a1a2365ca01d6df9d33327eb5ff9a7b607589513753742143
-
Size
110KB
-
Sample
221123-lvxf4acd33
-
MD5
5f586ee90234777d2fee0f2162718514
-
SHA1
6f6db162105e7ac3424d857b40ca05376a56b8b8
-
SHA256
03ba732eb5d3a18a1a2365ca01d6df9d33327eb5ff9a7b607589513753742143
-
SHA512
758cdd9c2dc8c363852a0588f8fbf25aa19e19a6119268eba3f0a7a0fb80e97901039cb80270caa29908f34dcf1d516da42feba0213966181704f5a3adeb2e16
-
SSDEEP
3072:zd9e9dpJDsf7xQWCD7CD5JGbEt9290KTU9H9:B+tDKNQ1D7CD5JAA9c0KI9d
Static task
static1
Behavioral task
behavioral1
Sample
03ba732eb5d3a18a1a2365ca01d6df9d33327eb5ff9a7b607589513753742143.exe
Resource
win7-20220901-en
Malware Config
Extracted
pony
http://golklopro.com/bitrix/modules.php
http://cosjesgame.su/bitrix/modules.php
-
payload_url
http://carkickz.com/333.exe
http://cloud9surfphilippines.com/333.exe
http://centarsvijeta.com/333.exe
http://yourthainess.com/333.exe
http://se-vende-direct.com/333.exe
Targets
-
-
Target
03ba732eb5d3a18a1a2365ca01d6df9d33327eb5ff9a7b607589513753742143
-
Size
110KB
-
MD5
5f586ee90234777d2fee0f2162718514
-
SHA1
6f6db162105e7ac3424d857b40ca05376a56b8b8
-
SHA256
03ba732eb5d3a18a1a2365ca01d6df9d33327eb5ff9a7b607589513753742143
-
SHA512
758cdd9c2dc8c363852a0588f8fbf25aa19e19a6119268eba3f0a7a0fb80e97901039cb80270caa29908f34dcf1d516da42feba0213966181704f5a3adeb2e16
-
SSDEEP
3072:zd9e9dpJDsf7xQWCD7CD5JGbEt9290KTU9H9:B+tDKNQ1D7CD5JAA9c0KI9d
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-