General
-
Target
1ddd335f3976259b8aa05abae99fff151adf21895cdb5d6ebd7b4776c1ed49ff
-
Size
58KB
-
Sample
221201-gfyy6ade4z
-
MD5
8a302c9bbeed3c414f4785802e4a1846
-
SHA1
86b6777074a49169e6a43d435602178a77667600
-
SHA256
1ddd335f3976259b8aa05abae99fff151adf21895cdb5d6ebd7b4776c1ed49ff
-
SHA512
ddaec0895626e1dddb8132e5b1c74c5ef010cc37a3632a2a3f08c0563ed5ac7f2b2eeb2fd9be9fb3d184f788798af0806693aad7a542f851ebb8de0054a5407c
-
SSDEEP
1536:Wn/Mzq+5hRpfvF7I+KQau+VNON2EmGoj7R00u9HUpmNgsNg:A1+LaXNOCXjt1u9HUIaWg
Static task
static1
Behavioral task
behavioral1
Sample
1ddd335f3976259b8aa05abae99fff151adf21895cdb5d6ebd7b4776c1ed49ff.exe
Resource
win7-20220901-en
Malware Config
Extracted
pony
http://rhjmcvo.info:9135/pic/fly.php
http://egtjbht.info:9135/pic/fly.php
Targets
-
-
Target
1ddd335f3976259b8aa05abae99fff151adf21895cdb5d6ebd7b4776c1ed49ff
-
Size
58KB
-
MD5
8a302c9bbeed3c414f4785802e4a1846
-
SHA1
86b6777074a49169e6a43d435602178a77667600
-
SHA256
1ddd335f3976259b8aa05abae99fff151adf21895cdb5d6ebd7b4776c1ed49ff
-
SHA512
ddaec0895626e1dddb8132e5b1c74c5ef010cc37a3632a2a3f08c0563ed5ac7f2b2eeb2fd9be9fb3d184f788798af0806693aad7a542f851ebb8de0054a5407c
-
SSDEEP
1536:Wn/Mzq+5hRpfvF7I+KQau+VNON2EmGoj7R00u9HUpmNgsNg:A1+LaXNOCXjt1u9HUIaWg
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-