General
-
Target
d3e5addc3f36246d8e7494c367ec0f05
-
Size
128KB
-
Sample
240318-s88vlsch7t
-
MD5
d3e5addc3f36246d8e7494c367ec0f05
-
SHA1
4e5940a3af0b548cac738b89dd0f31ef2eaf3da0
-
SHA256
3e703724d4150fa681104e1f3631aaa2e511fd05f67c689bfbb1d8428bbb2b50
-
SHA512
9a77045e34015184dc0620c91545d054e38c8ff647ee71e470ef967d96123c335024927b0ab9adef23e5d2b50a55dd72466a26c334763f87cd804efb14c525be
-
SSDEEP
3072:uGHi6mw0ZeZWsHDXVjMveyYshh5v28zdfBeSg:+nZPsHDXV1shf28ztr
Static task
static1
Behavioral task
behavioral1
Sample
d3e5addc3f36246d8e7494c367ec0f05.exe
Resource
win7-20240221-en
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://216.231.139.111/forum/viewtopic.php
-
payload_url
http://realitycoaching.es/pm3Wi2bw.exe
http://xmacorporation.com/ajaxam.js/7Gg10T4.exe
Targets
-
-
Target
d3e5addc3f36246d8e7494c367ec0f05
-
Size
128KB
-
MD5
d3e5addc3f36246d8e7494c367ec0f05
-
SHA1
4e5940a3af0b548cac738b89dd0f31ef2eaf3da0
-
SHA256
3e703724d4150fa681104e1f3631aaa2e511fd05f67c689bfbb1d8428bbb2b50
-
SHA512
9a77045e34015184dc0620c91545d054e38c8ff647ee71e470ef967d96123c335024927b0ab9adef23e5d2b50a55dd72466a26c334763f87cd804efb14c525be
-
SSDEEP
3072:uGHi6mw0ZeZWsHDXVjMveyYshh5v28zdfBeSg:+nZPsHDXV1shf28ztr
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-