General
-
Target
3a9a913c93b4bdc43fa72590bad1cbbd7ac7be8dd7eb71eb6b8e94c8ba578f5e
-
Size
283KB
-
Sample
221127-wkyaraga52
-
MD5
cbb0699911e1d8ba0b2e4a2672e4a6d7
-
SHA1
6b514e379d0b417334442671e15d9c17316c8490
-
SHA256
3a9a913c93b4bdc43fa72590bad1cbbd7ac7be8dd7eb71eb6b8e94c8ba578f5e
-
SHA512
868239e95b1c83711a84d2d472c5e9aa2dfd90c22a7bb0deebb7ea1d697351196cda807d528f6806cb2f972b1576a323c1540a1c6f8076ea4eece82eb6f0b85e
-
SSDEEP
6144:ahz2C9gVQNZwKkf2xCyX6BXpt4rfpDdmQyUbJEa4t0aG/C8a:aAC9gVESK1uXpGrfpDdmh6v4tQ/C8a
Static task
static1
Behavioral task
behavioral1
Sample
3a9a913c93b4bdc43fa72590bad1cbbd7ac7be8dd7eb71eb6b8e94c8ba578f5e.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://taskintelguard.gamingg.ml/pon/gate.php
Targets
-
-
Target
3a9a913c93b4bdc43fa72590bad1cbbd7ac7be8dd7eb71eb6b8e94c8ba578f5e
-
Size
283KB
-
MD5
cbb0699911e1d8ba0b2e4a2672e4a6d7
-
SHA1
6b514e379d0b417334442671e15d9c17316c8490
-
SHA256
3a9a913c93b4bdc43fa72590bad1cbbd7ac7be8dd7eb71eb6b8e94c8ba578f5e
-
SHA512
868239e95b1c83711a84d2d472c5e9aa2dfd90c22a7bb0deebb7ea1d697351196cda807d528f6806cb2f972b1576a323c1540a1c6f8076ea4eece82eb6f0b85e
-
SSDEEP
6144:ahz2C9gVQNZwKkf2xCyX6BXpt4rfpDdmQyUbJEa4t0aG/C8a:aAC9gVESK1uXpGrfpDdmh6v4tQ/C8a
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-