General
-
Target
tmp
-
Size
202KB
-
Sample
230306-j7lt1sbc52
-
MD5
eebe07ffa7b0735675bf35bf6c18dff7
-
SHA1
be6cdd7497d40ba8f79369f49bbfc02740402fe4
-
SHA256
f9225f73a27a6e50b5621aa9a702e3fb98261cef2c33ef90944b3a86db43c111
-
SHA512
374cec9887aa9aa97f264aeab03fd42c21c4d7c12a4da3c05b93e4ba13a96e810b47d093ccf235e47f630d507edd48ef9d0c095341fcc427052a05dc4cd1b891
-
SSDEEP
6144:oBbNmTHgGAEHcMbojtXZ7JyIt0RbDUb+N/0rXvfb63w:oBbNKHgzEe4M0R/orXr
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
pony
http://egem.gr/cloud/panel/gate.php
-
payload_url
http://myp0nysite.ru/shit.exe
Targets
-
-
Target
tmp
-
Size
202KB
-
MD5
eebe07ffa7b0735675bf35bf6c18dff7
-
SHA1
be6cdd7497d40ba8f79369f49bbfc02740402fe4
-
SHA256
f9225f73a27a6e50b5621aa9a702e3fb98261cef2c33ef90944b3a86db43c111
-
SHA512
374cec9887aa9aa97f264aeab03fd42c21c4d7c12a4da3c05b93e4ba13a96e810b47d093ccf235e47f630d507edd48ef9d0c095341fcc427052a05dc4cd1b891
-
SSDEEP
6144:oBbNmTHgGAEHcMbojtXZ7JyIt0RbDUb+N/0rXvfb63w:oBbNKHgzEe4M0R/orXr
Score10/10-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-