General
-
Target
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc
-
Size
180KB
-
Sample
221123-lvyn6afg5z
-
MD5
6803d29c48f1f6b5cc44287ad7bb9f0a
-
SHA1
8284880ad59991fb12bb2451979fca8763f4a81f
-
SHA256
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc
-
SHA512
3c9270e38664e6b6aa709b39259107ac06232ad884b64af0326b832947f650f792e72768f106efaf6e0814a769523cba8af230e6d5d2c393e5aeae3c33b2a94f
-
SSDEEP
3072:GyLrbCNjinOCDtzeQftP2hb1X6Ly6DHGqqpC3owZ:5XbCNjiNJzewtP+Z6W6iOYI
Static task
static1
Behavioral task
behavioral1
Sample
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
pony
http://golklopro.com/bitrix/modules.php
http://cosjesgame.su/bitrix/modules.php
-
payload_url
http://carkickz.com/333.exe
http://cloud9surfphilippines.com/333.exe
http://centarsvijeta.com/333.exe
http://yourthainess.com/333.exe
http://se-vende-direct.com/333.exe
Targets
-
-
Target
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc
-
Size
180KB
-
MD5
6803d29c48f1f6b5cc44287ad7bb9f0a
-
SHA1
8284880ad59991fb12bb2451979fca8763f4a81f
-
SHA256
82d499e31742ec1ca4e7ae1aa85b2e2f8a6f4a0ac41c354ba3741ae723c1d0fc
-
SHA512
3c9270e38664e6b6aa709b39259107ac06232ad884b64af0326b832947f650f792e72768f106efaf6e0814a769523cba8af230e6d5d2c393e5aeae3c33b2a94f
-
SSDEEP
3072:GyLrbCNjinOCDtzeQftP2hb1X6Ly6DHGqqpC3owZ:5XbCNjiNJzewtP+Z6W6iOYI
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-