General
-
Target
21f55203cdbb98339c575f81328b00bd8397306995a2abd89c8f2c4f195786ab
-
Size
1.5MB
-
Sample
221126-kkanxafa68
-
MD5
40570856df7efebd7ebda05408224e1b
-
SHA1
47cc7a0b90c6b79c4416476e5b5ced7422ea6247
-
SHA256
21f55203cdbb98339c575f81328b00bd8397306995a2abd89c8f2c4f195786ab
-
SHA512
449fcab507e352bcb736bf03292b269afdc3ae3b8382bfbf19d82f7167951e9bf66fdf2997dc7b625d47162a9fff1a4996a4b2dd380a170f06767e61455cc417
-
SSDEEP
24576:wGd3O+nY5gC8WlgzkjD2oSOH+nqUmM31ShHT4TSEoSo/6Z6fgVXmCwIhr:w2LYghcgIvbZ+pj04OEto/s6fYmGh
Static task
static1
Behavioral task
behavioral1
Sample
21f55203cdbb98339c575f81328b00bd8397306995a2abd89c8f2c4f195786ab.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://newwork.hostoi.com/Panel/gate.php
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
123owerri
Targets
-
-
Target
21f55203cdbb98339c575f81328b00bd8397306995a2abd89c8f2c4f195786ab
-
Size
1.5MB
-
MD5
40570856df7efebd7ebda05408224e1b
-
SHA1
47cc7a0b90c6b79c4416476e5b5ced7422ea6247
-
SHA256
21f55203cdbb98339c575f81328b00bd8397306995a2abd89c8f2c4f195786ab
-
SHA512
449fcab507e352bcb736bf03292b269afdc3ae3b8382bfbf19d82f7167951e9bf66fdf2997dc7b625d47162a9fff1a4996a4b2dd380a170f06767e61455cc417
-
SSDEEP
24576:wGd3O+nY5gC8WlgzkjD2oSOH+nqUmM31ShHT4TSEoSo/6Z6fgVXmCwIhr:w2LYghcgIvbZ+pj04OEto/s6fYmGh
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-