General
-
Target
3710cb127d579b664c2e51824a682aa464637934939d37ad2716e2801c8e5096
-
Size
403KB
-
Sample
221125-nvs5sahe2x
-
MD5
3b3f15a324eb71990ff318a9400f2916
-
SHA1
ea77333b991e5dc07cbaf01d45ddab8cad428fe8
-
SHA256
3710cb127d579b664c2e51824a682aa464637934939d37ad2716e2801c8e5096
-
SHA512
f1b5047f4674b59ffd87c56c2efb117055a0ed016a994978f9c10d5c422dbce805c9269803b65de47df75b49da6b1c013309074c2780b30ad51fa8796fac14d6
-
SSDEEP
1536:Ema7VL95xgPdBPYXKQZwpzewVZkV5tr1kcHo4FVi7uj7Yt0ZZC3b3BmsPWcQugyw:o5L9WGZyyp5tVYtfZ/81QURGq2LGes
Static task
static1
Behavioral task
behavioral1
Sample
3710cb127d579b664c2e51824a682aa464637934939d37ad2716e2801c8e5096.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://185.7.34.251/~umord163/dikpony/gate.php
Targets
-
-
Target
3710cb127d579b664c2e51824a682aa464637934939d37ad2716e2801c8e5096
-
Size
403KB
-
MD5
3b3f15a324eb71990ff318a9400f2916
-
SHA1
ea77333b991e5dc07cbaf01d45ddab8cad428fe8
-
SHA256
3710cb127d579b664c2e51824a682aa464637934939d37ad2716e2801c8e5096
-
SHA512
f1b5047f4674b59ffd87c56c2efb117055a0ed016a994978f9c10d5c422dbce805c9269803b65de47df75b49da6b1c013309074c2780b30ad51fa8796fac14d6
-
SSDEEP
1536:Ema7VL95xgPdBPYXKQZwpzewVZkV5tr1kcHo4FVi7uj7Yt0ZZC3b3BmsPWcQugyw:o5L9WGZyyp5tVYtfZ/81QURGq2LGes
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-