General
-
Target
2bb12f8b78a107945edddda412f66097f05257aef3161bfad28346920f411f47
-
Size
955KB
-
Sample
221126-z6dp1saa3y
-
MD5
f325df9646a5fc22bb908f573efc80aa
-
SHA1
0a9c7eab9eafdff918fcb05f3d8fba21189d14f7
-
SHA256
2bb12f8b78a107945edddda412f66097f05257aef3161bfad28346920f411f47
-
SHA512
de28454c35f28431233f352788294c40f5ef7360028ee3d37569f506849ae45c62af19d39422d4eb20a352a877bbba85bc090fad848315c6120274228159bab1
-
SSDEEP
12288:Yta2R0ohMu4HUsPhHVPxUaunq9IJt+vF7XzsZ1kyQHSMBVNVuRJVoYyuGpdLd0Bu:b2zmjHUsHVGKhvFrzjszoJuGptd05M/
Static task
static1
Behavioral task
behavioral1
Sample
2bb12f8b78a107945edddda412f66097f05257aef3161bfad28346920f411f47.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://steaxcommunity.com/additional_log/gate.php
-
payload_url
http://behinde-illizion.ru/amator/gaben.exe
Targets
-
-
Target
2bb12f8b78a107945edddda412f66097f05257aef3161bfad28346920f411f47
-
Size
955KB
-
MD5
f325df9646a5fc22bb908f573efc80aa
-
SHA1
0a9c7eab9eafdff918fcb05f3d8fba21189d14f7
-
SHA256
2bb12f8b78a107945edddda412f66097f05257aef3161bfad28346920f411f47
-
SHA512
de28454c35f28431233f352788294c40f5ef7360028ee3d37569f506849ae45c62af19d39422d4eb20a352a877bbba85bc090fad848315c6120274228159bab1
-
SSDEEP
12288:Yta2R0ohMu4HUsPhHVPxUaunq9IJt+vF7XzsZ1kyQHSMBVNVuRJVoYyuGpdLd0Bu:b2zmjHUsHVGKhvFrzjszoJuGptd05M/
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-