General
-
Target
a4b44cbead98355ac5bc87a8c72a83192c8a3c823a69b2cb191912f59c0eb307
-
Size
161KB
-
Sample
221202-xmd6bsdg22
-
MD5
4db7be2f72305518e412940b1bdf659c
-
SHA1
af24b69b76106521fc68bb1d85adc1b67c3405e1
-
SHA256
a4b44cbead98355ac5bc87a8c72a83192c8a3c823a69b2cb191912f59c0eb307
-
SHA512
74475290292356e092f2d19ce7680ce840b4af21eb48764c1ca0f14977849653279d7afec4388a13686b9ea9ed9e24f7bd52f0701eb49e3c53d3661c58a912c6
-
SSDEEP
3072:kVNGN/bF9sP9m9VaTA7adKx0nNnXTwszf1TVb9BIq+aBz:kVNGNZyFYuA7axNnDNRTVb9BIxat
Static task
static1
Behavioral task
behavioral1
Sample
a4b44cbead98355ac5bc87a8c72a83192c8a3c823a69b2cb191912f59c0eb307.exe
Resource
win7-20221111-en
Malware Config
Extracted
pony
http://tunningdisel.net/forum/viewtopic.php
http://turbodiselvrx.net/forum/viewtopic.php
-
payload_url
http://3073.a.hostable.me/Z2U.exe
http://85.18.21.252/PNV3Hbi.exe
Targets
-
-
Target
a4b44cbead98355ac5bc87a8c72a83192c8a3c823a69b2cb191912f59c0eb307
-
Size
161KB
-
MD5
4db7be2f72305518e412940b1bdf659c
-
SHA1
af24b69b76106521fc68bb1d85adc1b67c3405e1
-
SHA256
a4b44cbead98355ac5bc87a8c72a83192c8a3c823a69b2cb191912f59c0eb307
-
SHA512
74475290292356e092f2d19ce7680ce840b4af21eb48764c1ca0f14977849653279d7afec4388a13686b9ea9ed9e24f7bd52f0701eb49e3c53d3661c58a912c6
-
SSDEEP
3072:kVNGN/bF9sP9m9VaTA7adKx0nNnXTwszf1TVb9BIq+aBz:kVNGNZyFYuA7axNnDNRTVb9BIxat
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-