General
-
Target
43eacd3ef72a7556b1bc6686185d846bde5acd3dce20fdd03322a2556f4cc557
-
Size
541KB
-
Sample
221125-cphw3shb2z
-
MD5
6071c6114fc46941ed66509e490e1be3
-
SHA1
4536cfae22a610c8e546529782f35165e1c3ad27
-
SHA256
43eacd3ef72a7556b1bc6686185d846bde5acd3dce20fdd03322a2556f4cc557
-
SHA512
d1fde3cb89004f42ae87a5a9d7a1bb2f47987aea36c9246d34df44e2f089524964c41ce143d3598092198d4cbfdece793fb8161b77165744f35684ddd5d96fa1
-
SSDEEP
6144:16jHolWZcghHlBk78R79xGQhR0z40bmadjs/oIBcMTrIPbYwoT5SRVRncqBDYk:16Ul0cX8DMQha40FlMTrIPbD0cRncq
Static task
static1
Behavioral task
behavioral1
Sample
43eacd3ef72a7556b1bc6686185d846bde5acd3dce20fdd03322a2556f4cc557.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://91.220.163.32/p/gate.php
Targets
-
-
Target
43eacd3ef72a7556b1bc6686185d846bde5acd3dce20fdd03322a2556f4cc557
-
Size
541KB
-
MD5
6071c6114fc46941ed66509e490e1be3
-
SHA1
4536cfae22a610c8e546529782f35165e1c3ad27
-
SHA256
43eacd3ef72a7556b1bc6686185d846bde5acd3dce20fdd03322a2556f4cc557
-
SHA512
d1fde3cb89004f42ae87a5a9d7a1bb2f47987aea36c9246d34df44e2f089524964c41ce143d3598092198d4cbfdece793fb8161b77165744f35684ddd5d96fa1
-
SSDEEP
6144:16jHolWZcghHlBk78R79xGQhR0z40bmadjs/oIBcMTrIPbYwoT5SRVRncqBDYk:16Ul0cX8DMQha40FlMTrIPbD0cRncq
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-