General
-
Target
b1d16e1de1969b36d18f40855272f754caddabde8c5ef693208c071377a6b7d9
-
Size
77KB
-
Sample
221203-h1njlaee29
-
MD5
507d6ff564943c5203392fd6961e38fa
-
SHA1
185970e25ff5d11a244a835686689401e3184db4
-
SHA256
b1d16e1de1969b36d18f40855272f754caddabde8c5ef693208c071377a6b7d9
-
SHA512
a16aa439499e1334bb449e74e4e2d652da99e96cc45644c90a08b1a5abc4fe81a5b645f50d66342d87a963497c204d46c743a1248c6c32c6470bad86db017b71
-
SSDEEP
1536:mf4uas6OXByfNSfIsiya+a19LLKdnABrAS6f/igyATpSh:2ssfByfNmIDya14jrHig18h
Static task
static1
Behavioral task
behavioral1
Sample
b1d16e1de1969b36d18f40855272f754caddabde8c5ef693208c071377a6b7d9.exe
Resource
win7-20220812-en
Malware Config
Extracted
pony
http://choiceonesupport.org/default.php?5QoWsezRsgUSO1EjQZfVO1y9VOAlXUC
http://lienansaigonhotel.com/default.php?cH1BQ4VfMtAKsxRRBFq7a298Ppt8KL
http://youcaan.com/default.php?IUYzgdBuLMWkvhHvyTb6pRxBtsGNsMOEgwAnG7UM
http://e3pos.com/default.php?eVlJPYuh4bNSccpCgTDQEzJz772oc1F8NHjp4XljZD
http://4g-mlm.com/default.php?lYaySmWNad9hOOqgVfBmZoBu2As17VV2OljQqVrav
Targets
-
-
Target
b1d16e1de1969b36d18f40855272f754caddabde8c5ef693208c071377a6b7d9
-
Size
77KB
-
MD5
507d6ff564943c5203392fd6961e38fa
-
SHA1
185970e25ff5d11a244a835686689401e3184db4
-
SHA256
b1d16e1de1969b36d18f40855272f754caddabde8c5ef693208c071377a6b7d9
-
SHA512
a16aa439499e1334bb449e74e4e2d652da99e96cc45644c90a08b1a5abc4fe81a5b645f50d66342d87a963497c204d46c743a1248c6c32c6470bad86db017b71
-
SSDEEP
1536:mf4uas6OXByfNSfIsiya+a19LLKdnABrAS6f/igyATpSh:2ssfByfNmIDya14jrHig18h
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-