General
-
Target
1872-63-0x0000000000400000-0x00000000004D7000-memory.dmp
-
Size
860KB
-
Sample
230507-qdfjgaeg22
-
MD5
eb8ff0fb845fce5b55e77bc9de0631dc
-
SHA1
567ce699cf523fc61ee71a2e1eb3ed5b303cb744
-
SHA256
8994d3afef6a8d810d891e42231b7fb1f5625c7ad6bfb1794052fca73e68f244
-
SHA512
9ade3362a8d396ad0d83b18b400bbe1a4bc505f3d70a147d694f5a16259e6f62e046969e1e5d9b0f5b67b15127fde3fd0560fd2d1f793dfea036a522defca155
-
SSDEEP
1536:EMoizM4UZqTCO69Mxe/ANGvRxp1xktOej1aXYDx5ULOb4hSvvQsNkzm+U6aJ:OSBUMSxp1aRjcOb4hMhh6c
Behavioral task
behavioral1
Sample
1872-63-0x0000000000400000-0x00000000004D7000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1872-63-0x0000000000400000-0x00000000004D7000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
pony
http://sunelec-kk.com/tmp/r1.php
http://japmotors.net/tmp/r1.php
-
payload_url
http://globalofficesolution.net/tmp/file1.exe
http://globalofficesolution.net/tmp/file2.exe
http://davesclassics.com.au/tmp/file1.exe
http://davesclassics.com.au/tmp/file2.exe
Targets
-
-
Target
1872-63-0x0000000000400000-0x00000000004D7000-memory.dmp
-
Size
860KB
-
MD5
eb8ff0fb845fce5b55e77bc9de0631dc
-
SHA1
567ce699cf523fc61ee71a2e1eb3ed5b303cb744
-
SHA256
8994d3afef6a8d810d891e42231b7fb1f5625c7ad6bfb1794052fca73e68f244
-
SHA512
9ade3362a8d396ad0d83b18b400bbe1a4bc505f3d70a147d694f5a16259e6f62e046969e1e5d9b0f5b67b15127fde3fd0560fd2d1f793dfea036a522defca155
-
SSDEEP
1536:EMoizM4UZqTCO69Mxe/ANGvRxp1xktOej1aXYDx5ULOb4hSvvQsNkzm+U6aJ:OSBUMSxp1aRjcOb4hMhh6c
Score3/10 -