General
-
Target
b2af2aea0b11fba385e100d9953aa4c8fe773a8e5ac3bc4e060593039b1d2cba
-
Size
113KB
-
Sample
221130-225n2sgc7z
-
MD5
0947d89d47fec71703630b166bd9ae00
-
SHA1
68f8add4ec74a985e71acc6103bda3f6d8e8b3a6
-
SHA256
b2af2aea0b11fba385e100d9953aa4c8fe773a8e5ac3bc4e060593039b1d2cba
-
SHA512
5167b8c7f165add2db95dc6f2b4c62b1451e385099da67e1547d0a7065d1d2a13feb813cf3c8d6168f8839553e2c5cba141ff5abb739d7a2c9cac53147dac4a7
-
SSDEEP
3072:iC0C5vtbOdk9m75chw/7/1TUTDmu5puJPCmu:EqOdksH7/1wTPfp
Static task
static1
Behavioral task
behavioral1
Sample
b2af2aea0b11fba385e100d9953aa4c8fe773a8e5ac3bc4e060593039b1d2cba.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://watchfp.org/forum/viewtopic.php
http://dshapovalov.info/forum/viewtopic.php
http://journeyacrossthesky.com/forum/viewtopic.php
http://journeyacrossthesky.org/forum/viewtopic.php
-
payload_url
http://mvwebsites.com.au/bmSe4BN.exe
http://clients.fireprotected.com/TJe34.exe
http://www.mit-stolz-vorbei-dollbergen.de/w8BDM.exe
http://ftp.petrasolutions.com/JpVsf.exe
Targets
-
-
Target
b2af2aea0b11fba385e100d9953aa4c8fe773a8e5ac3bc4e060593039b1d2cba
-
Size
113KB
-
MD5
0947d89d47fec71703630b166bd9ae00
-
SHA1
68f8add4ec74a985e71acc6103bda3f6d8e8b3a6
-
SHA256
b2af2aea0b11fba385e100d9953aa4c8fe773a8e5ac3bc4e060593039b1d2cba
-
SHA512
5167b8c7f165add2db95dc6f2b4c62b1451e385099da67e1547d0a7065d1d2a13feb813cf3c8d6168f8839553e2c5cba141ff5abb739d7a2c9cac53147dac4a7
-
SSDEEP
3072:iC0C5vtbOdk9m75chw/7/1TUTDmu5puJPCmu:EqOdksH7/1wTPfp
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-