General
-
Target
4fff3587915bd7525aaba1959cb9cd85bb99cb9fb2d211662d55b7eb133a1008
-
Size
580KB
-
Sample
221125-b29d5afg2z
-
MD5
add84b66f6a6141777496db29535e8b1
-
SHA1
9bc94956956b1f2276dcd115756fa25340eba52b
-
SHA256
4fff3587915bd7525aaba1959cb9cd85bb99cb9fb2d211662d55b7eb133a1008
-
SHA512
393f8e62e640b3a603489c12973219776b94d42e8aa5fc4fd2949f90b6f04e534daccd60107c7e54cc547d9ba7000aef8a35f348fb6d34e7da516658218e3b2c
-
SSDEEP
6144:wYvQ3CJ0eel1vWjLu7ioQxI3F6GlSa6fVTWQvc19jlns5GDevfPoYt:GCJ0eU9oLu7ioQxImfhW4C9jlnyce/oU
Static task
static1
Behavioral task
behavioral1
Sample
4fff3587915bd7525aaba1959cb9cd85bb99cb9fb2d211662d55b7eb133a1008.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://aliboy.favcc1.com/gate.php
-
payload_url
http://aliboy.favcc1.com/shit.exe
Targets
-
-
Target
4fff3587915bd7525aaba1959cb9cd85bb99cb9fb2d211662d55b7eb133a1008
-
Size
580KB
-
MD5
add84b66f6a6141777496db29535e8b1
-
SHA1
9bc94956956b1f2276dcd115756fa25340eba52b
-
SHA256
4fff3587915bd7525aaba1959cb9cd85bb99cb9fb2d211662d55b7eb133a1008
-
SHA512
393f8e62e640b3a603489c12973219776b94d42e8aa5fc4fd2949f90b6f04e534daccd60107c7e54cc547d9ba7000aef8a35f348fb6d34e7da516658218e3b2c
-
SSDEEP
6144:wYvQ3CJ0eel1vWjLu7ioQxI3F6GlSa6fVTWQvc19jlns5GDevfPoYt:GCJ0eU9oLu7ioQxImfhW4C9jlnyce/oU
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-