General
-
Target
575bb841a8aead103385bb6522c1d23ea520d9faf5e0b7a15efe1c0024dc3129
-
Size
277KB
-
Sample
221127-mpgzwsag35
-
MD5
81607633841cb5589d0c32fe471bfa72
-
SHA1
3ee8a2499d370a32d39a5059d4940e39638fbb88
-
SHA256
575bb841a8aead103385bb6522c1d23ea520d9faf5e0b7a15efe1c0024dc3129
-
SHA512
82bb88f8ab80e6aa152415aec7494666c9d455667f1654f1bde3cf5470331a27494039826d70824060d0971cfdc0656c61bf63d22d1dbfaeafa98b84c670d968
-
SSDEEP
6144:5iI+fVUEuO3JPb+J6BUCZfQrGu0wevba/5U8+TebMv/BLBTWe:5B+fVUUJqSsGQevomnCsVU
Static task
static1
Behavioral task
behavioral1
Sample
575bb841a8aead103385bb6522c1d23ea520d9faf5e0b7a15efe1c0024dc3129.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://wireshark-download.sytes.net/pon/gate.php
Targets
-
-
Target
575bb841a8aead103385bb6522c1d23ea520d9faf5e0b7a15efe1c0024dc3129
-
Size
277KB
-
MD5
81607633841cb5589d0c32fe471bfa72
-
SHA1
3ee8a2499d370a32d39a5059d4940e39638fbb88
-
SHA256
575bb841a8aead103385bb6522c1d23ea520d9faf5e0b7a15efe1c0024dc3129
-
SHA512
82bb88f8ab80e6aa152415aec7494666c9d455667f1654f1bde3cf5470331a27494039826d70824060d0971cfdc0656c61bf63d22d1dbfaeafa98b84c670d968
-
SSDEEP
6144:5iI+fVUEuO3JPb+J6BUCZfQrGu0wevba/5U8+TebMv/BLBTWe:5B+fVUUJqSsGQevomnCsVU
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-