General
-
Target
395c6151624f73b39fdfd2825.exe
-
Size
702KB
-
Sample
230707-pad1sshh51
-
MD5
eff961cad9e82ec0bc3766e45e6df319
-
SHA1
c3f1c5ec3f7c0c9060f2b15f274fcdb0c7c2d918
-
SHA256
395c6151624f73b39fdfd282534279878b433efb964bcc15cad2e4f818d89eb8
-
SHA512
aafd6ce975e6a90f173392d25dc859e61d32676d20835eac77569c360ee63474b90b66c5054803866080bb97ad8e3d2c238ea6e1af645bdb3786f88b28c2042e
-
SSDEEP
12288:RquErHF6xC9D6DmR1J98w4oknqOKw59XxYRcjnn+ClOq60XDv8OOTHiBHM:Url6kD68JmloO5TYI1lOq6sb8hTHAM
Behavioral task
behavioral1
Sample
395c6151624f73b39fdfd2825.exe
Resource
win7-20230703-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
395c6151624f73b39fdfd2825.exe
-
Size
702KB
-
MD5
eff961cad9e82ec0bc3766e45e6df319
-
SHA1
c3f1c5ec3f7c0c9060f2b15f274fcdb0c7c2d918
-
SHA256
395c6151624f73b39fdfd282534279878b433efb964bcc15cad2e4f818d89eb8
-
SHA512
aafd6ce975e6a90f173392d25dc859e61d32676d20835eac77569c360ee63474b90b66c5054803866080bb97ad8e3d2c238ea6e1af645bdb3786f88b28c2042e
-
SSDEEP
12288:RquErHF6xC9D6DmR1J98w4oknqOKw59XxYRcjnn+ClOq60XDv8OOTHiBHM:Url6kD68JmloO5TYI1lOq6sb8hTHAM
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-