General
-
Target
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0
-
Size
114KB
-
Sample
221203-ddldhacc31
-
MD5
982c13176a75151ef118d401d61bce69
-
SHA1
7eadc5064c7baaf8956919480ebfec411ced0356
-
SHA256
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0
-
SHA512
9d6c8197054f236995554c872651867939387e01a64e2759604a53d1851ffe28de0c47144e5d86ac6fbfd1277d6340a3ce53529593d59174438ffbf534ebdd51
-
SSDEEP
3072:/XAtWYKBlVkqGMCi+mm1O4AtWVE6moAiQzFO7UK9:fAoYKXVkaL+mm1O+SFzF
Behavioral task
behavioral1
Sample
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
pony
http://sam-latrilogie.com:8080/pony/gate.php
http://loceanic.fr:8080/pony/gate.php
-
payload_url
http://www.faraak.sk/Q6Ahxg.exe
http://lagarenne.ke0.eu/xAoU.exe
http://procurement.citarum.org/yqWP.exe
Targets
-
-
Target
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0
-
Size
114KB
-
MD5
982c13176a75151ef118d401d61bce69
-
SHA1
7eadc5064c7baaf8956919480ebfec411ced0356
-
SHA256
846ac08035fe932bab41e612de117f15bce82759e5da6734d686f4e946bdaab0
-
SHA512
9d6c8197054f236995554c872651867939387e01a64e2759604a53d1851ffe28de0c47144e5d86ac6fbfd1277d6340a3ce53529593d59174438ffbf534ebdd51
-
SSDEEP
3072:/XAtWYKBlVkqGMCi+mm1O4AtWVE6moAiQzFO7UK9:fAoYKXVkaL+mm1O+SFzF
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-