General
-
Target
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616
-
Size
152KB
-
Sample
221201-yv55fsah3s
-
MD5
b97fe4e54ac61942d87994dc87e0b7aa
-
SHA1
8e9fb88e4e2f1c7adfc807ad057f035aae9cc597
-
SHA256
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616
-
SHA512
ca3466c1f5b1f3d8dd38281ee7a8a5aae8b9c2d5bd1b34bd575dfcd1f3bab83700878479f51620d9b1a43d4518bee318f07f2b4008647384abd4be02c52755b2
-
SSDEEP
3072:vsM+xYtQrCIcDO4ZTGv1RRy93nRd93eFTzZeSWijRN3CtGJ:ZR+CPO4ZTUAVVCzQdi9N3C
Behavioral task
behavioral1
Sample
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
pony
http://66.55.89.149:8080/forum/viewtopic.php
http://66.55.89.150:8080/forum/viewtopic.php
-
payload_url
http://cikonungunlugu.com/CMw.exe
http://ftp.lastraautosport.com.ar/xjH.exe
Targets
-
-
Target
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616
-
Size
152KB
-
MD5
b97fe4e54ac61942d87994dc87e0b7aa
-
SHA1
8e9fb88e4e2f1c7adfc807ad057f035aae9cc597
-
SHA256
a565372aa4ce6cb9e48d40bdf19d0d1188f8bf7799c0293fb4713e691b345616
-
SHA512
ca3466c1f5b1f3d8dd38281ee7a8a5aae8b9c2d5bd1b34bd575dfcd1f3bab83700878479f51620d9b1a43d4518bee318f07f2b4008647384abd4be02c52755b2
-
SSDEEP
3072:vsM+xYtQrCIcDO4ZTGv1RRy93nRd93eFTzZeSWijRN3CtGJ:ZR+CPO4ZTUAVVCzQdi9N3C
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-