General
-
Target
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969
-
Size
144KB
-
Sample
221123-qz1frsfc68
-
MD5
c0b49dbf532345119a0e09919ca8b87b
-
SHA1
9db5b313c94f50e2025f36871ea4deef81f633b4
-
SHA256
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969
-
SHA512
abe550213352196c530ba2c12a6d7c2dcc12c054341e39d1b594f0d03c071e3fc6c1b59e87727e262e3ff4311a8abea126a9cddbc2d085ce7f83a27d6d71aba3
-
SSDEEP
3072:tlCZwX7wRUDzz+nOZAUMKed2e9bl2Fd9YpaJxjLuBmQ:fCZwX0u+nIAUj5wbOkazjLuBmQ
Behavioral task
behavioral1
Sample
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
pony
http://74.53.97.66:8080/forum/viewtopic.php
http://74.53.97.67:8080/forum/viewtopic.php
-
payload_url
http://www.ncga.org/toK.exe
http://lodejuancolon.com.ar/6EcNc.exe
http://plasticon.com.ar/ztrB66U.exe
Targets
-
-
Target
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969
-
Size
144KB
-
MD5
c0b49dbf532345119a0e09919ca8b87b
-
SHA1
9db5b313c94f50e2025f36871ea4deef81f633b4
-
SHA256
8cba0c9969d317ed0c24e04f66c5fefbd83418254d932d02672b98aa18271969
-
SHA512
abe550213352196c530ba2c12a6d7c2dcc12c054341e39d1b594f0d03c071e3fc6c1b59e87727e262e3ff4311a8abea126a9cddbc2d085ce7f83a27d6d71aba3
-
SSDEEP
3072:tlCZwX7wRUDzz+nOZAUMKed2e9bl2Fd9YpaJxjLuBmQ:fCZwX0u+nIAUj5wbOkazjLuBmQ
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-