General
-
Target
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
Size
280KB
-
Sample
221125-szjjcsge58
-
MD5
d78a2e8c8aeac70a63c65e07ad6ee368
-
SHA1
e434cc7204eade9dd86db22292eb4fa28a0542dd
-
SHA256
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
SHA512
831866dbd686b57302bdec41305b6300f7fad52c94e7c03f0ec6c8e010bae318ee0a3f1e90a24f1253f976d0f890b1a46308239d23688be8a9f20219c66ba9bd
-
SSDEEP
6144:0kixjxFjYT8PWrg6P5yD1o4WNQqMe5R6zC:0pxjnjYhP5yD1qCqMMR6zC
Static task
static1
Behavioral task
behavioral1
Sample
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
pony
http://77.221.144.119/p/gate.php
http://cityhotlove.com/p/gate.php
http://freefinder.me/p/gate.php
Targets
-
-
Target
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
Size
280KB
-
MD5
d78a2e8c8aeac70a63c65e07ad6ee368
-
SHA1
e434cc7204eade9dd86db22292eb4fa28a0542dd
-
SHA256
cc3d7c241aadbb1abd102bd54e26dd8c487d0863e3fb752a7a44e946d20142ad
-
SHA512
831866dbd686b57302bdec41305b6300f7fad52c94e7c03f0ec6c8e010bae318ee0a3f1e90a24f1253f976d0f890b1a46308239d23688be8a9f20219c66ba9bd
-
SSDEEP
6144:0kixjxFjYT8PWrg6P5yD1o4WNQqMe5R6zC:0pxjnjYhP5yD1qCqMMR6zC
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-