General
-
Target
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08
-
Size
120KB
-
Sample
221203-hkkg1age2t
-
MD5
8228101bdc678b8edf5acd810375a148
-
SHA1
da8f9be862f4e2e717415d135ad5352537390fb4
-
SHA256
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08
-
SHA512
033517cdb3517ee10f5400f1c19581f7be05db4c9d4a10f7cbd5a0ba5d0a8816570ec5b9a618961b2e5d38cf88f0b528660492110f848822026540c72e37ea12
-
SSDEEP
1536:CLLpnE5wNG6+h7e0wc+PiUgXrreJMrTmLCHLwlWmd0Pz/2j9v8mr/+jr5lUqUEl1:CHC76oFCKrKOrObwTc9v8UqvzJ7
Static task
static1
Behavioral task
behavioral1
Sample
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
pony
http://91.231.156.36/internet_goo.php
Targets
-
-
Target
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08
-
Size
120KB
-
MD5
8228101bdc678b8edf5acd810375a148
-
SHA1
da8f9be862f4e2e717415d135ad5352537390fb4
-
SHA256
b6c335a19598e3df52fcb73343df4ba4554e0e019845a1cb9e01850e5d1e2c08
-
SHA512
033517cdb3517ee10f5400f1c19581f7be05db4c9d4a10f7cbd5a0ba5d0a8816570ec5b9a618961b2e5d38cf88f0b528660492110f848822026540c72e37ea12
-
SSDEEP
1536:CLLpnE5wNG6+h7e0wc+PiUgXrreJMrTmLCHLwlWmd0Pz/2j9v8mr/+jr5lUqUEl1:CHC76oFCKrKOrObwTc9v8UqvzJ7
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-