General
-
Target
D5D623105BA8C0633C925913E62B72912B5A20B6D07FC.exe
-
Size
1.2MB
-
Sample
230206-hygm9sfh3z
-
MD5
eae8d33e4fa63719441d69e4342da97c
-
SHA1
6be35ec5a32fe198341ad6d21d24a06fdc8286c8
-
SHA256
d5d623105ba8c0633c925913e62b72912b5a20b6d07fc102ff52aaf47552fbf8
-
SHA512
6f800239c0f9015053ba19d8ffd29644c9146dddc68a0cd5c84c7f5f6ca5878dbe65d06115d07fdbe0d85a5eade68bbbb604a286fd841ab91e9883d313ff05ae
-
SSDEEP
12288:8nI89hJqSzS2mvPYBeXF/Bv4d0Rf+fTkn//lAUur7NSaR8bIDZe0QQC:AjhV22uwBcFpv4d0Rf6c/lw7cA2QC
Static task
static1
Behavioral task
behavioral1
Sample
D5D623105BA8C0633C925913E62B72912B5A20B6D07FC.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
D5D623105BA8C0633C925913E62B72912B5A20B6D07FC.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
pony
http://al-hadin.com/pony/gate.php
-
payload_url
http://michmetals.info/bin/Myshit.exe
Extracted
njrat
0.7.3
Exploited++
salesxpert.duckdns.org:2889
windows.exe
-
reg_key
windows.exe
-
splitter
mnbvcxz12
Targets
-
-
Target
D5D623105BA8C0633C925913E62B72912B5A20B6D07FC.exe
-
Size
1.2MB
-
MD5
eae8d33e4fa63719441d69e4342da97c
-
SHA1
6be35ec5a32fe198341ad6d21d24a06fdc8286c8
-
SHA256
d5d623105ba8c0633c925913e62b72912b5a20b6d07fc102ff52aaf47552fbf8
-
SHA512
6f800239c0f9015053ba19d8ffd29644c9146dddc68a0cd5c84c7f5f6ca5878dbe65d06115d07fdbe0d85a5eade68bbbb604a286fd841ab91e9883d313ff05ae
-
SSDEEP
12288:8nI89hJqSzS2mvPYBeXF/Bv4d0Rf+fTkn//lAUur7NSaR8bIDZe0QQC:AjhV22uwBcFpv4d0Rf6c/lw7cA2QC
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-