General
-
Target
d53dd7d82baec5078999c4aa1.exe
-
Size
702KB
-
Sample
230710-v7gqvadd9z
-
MD5
eaa0b312ca02b826eb0dc7e2a7cf40f0
-
SHA1
a138f9cd398f6f7b5d3c48b1a9939a9a13dc57c2
-
SHA256
d53dd7d82baec5078999c4aa1d81e2cdb0f137f6950030070a99736ff757a7c0
-
SHA512
f7fd415626a62f63f6a3137e23cfb241bc9b8f32dd9824c13ef574f4d6bb8fc31d91160447c722e5e44dd1793add4e93ca47e5749d56ddae6bb882c3bad905dc
-
SSDEEP
12288:RquErHF6xC9D6DmR1J98w4oknqOKw59XxYRcjnn+ClOq60XDv8OOTHiBHF:Url6kD68JmloO5TYI1lOq6sb8hTHAF
Behavioral task
behavioral1
Sample
d53dd7d82baec5078999c4aa1.exe
Resource
win7-20230703-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
d53dd7d82baec5078999c4aa1.exe
-
Size
702KB
-
MD5
eaa0b312ca02b826eb0dc7e2a7cf40f0
-
SHA1
a138f9cd398f6f7b5d3c48b1a9939a9a13dc57c2
-
SHA256
d53dd7d82baec5078999c4aa1d81e2cdb0f137f6950030070a99736ff757a7c0
-
SHA512
f7fd415626a62f63f6a3137e23cfb241bc9b8f32dd9824c13ef574f4d6bb8fc31d91160447c722e5e44dd1793add4e93ca47e5749d56ddae6bb882c3bad905dc
-
SSDEEP
12288:RquErHF6xC9D6DmR1J98w4oknqOKw59XxYRcjnn+ClOq60XDv8OOTHiBHF:Url6kD68JmloO5TYI1lOq6sb8hTHAF
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-