Behavioral task
behavioral1
Sample
7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c.exe
Resource
win10v2004-20240508-en
General
-
Target
7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c
-
Size
81KB
-
MD5
1e3b4c682700ed31fbd906621a898799
-
SHA1
11d5ee748f5924920188c3c15d906f05343ea62a
-
SHA256
7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c
-
SHA512
a0c8c9acb8d21add6c7d356915c1e9a533df70bb354dccb6ae6afc5d8c9f73ba8c494671427fed5dee02135371d26957fb19e4afd6cb181cc73836eacf6c3a04
-
SSDEEP
1536:HSXTeoKqTmyNSmAHhT/8g6Y3XAv1/lhTvdEYGkZqv:H23mmABT/cY3XALEYNqv
Malware Config
Extracted
pony
http://91.121.84.204:8080/pony/gate.php
http://91.121.93.178:8080/pony/gate.php
-
payload_url
http://power-tec.sk/D8aoPu86/XPVqAGE.exe
http://synergieassurance.com/AnJVfWxx/aFa.exe
http://20272.w72.wedos.net/w7y74z3H/Hzt.exe
Signatures
-
Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Pony family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c
Files
-
7b69169150d3aa853676cd9b62341895225724e78d76ca2059c3b24da49e313c.exe windows:4 windows x86 arch:x86
24372f561e1e1d10d855a874a39472c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ReadFile
CloseHandle
WriteFile
lstrlenA
GlobalLock
GlobalUnlock
LocalFree
LocalAlloc
lstrcpyA
lstrcatA
GetFileAttributesA
ExpandEnvironmentStringsA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
GetTempPathA
CreateDirectoryA
DeleteFileA
GetCurrentProcess
WideCharToMultiByte
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
GetModuleHandleA
GetVersionExA
GetLocaleInfoA
GetSystemInfo
GetWindowsDirectoryA
GetPrivateProfileStringA
SetCurrentDirectoryA
lstrcmpA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
GetCurrentDirectoryA
lstrlenW
MultiByteToWideChar
GetTickCount
Sleep
GetModuleFileNameA
GetLastError
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
LCMapStringA
ExitProcess
SetUnhandledExceptionFilter
ole32
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateGuid
CoTaskMemFree
CoCreateInstance
OleInitialize
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegEnumValueA
RegOpenCurrentUser
GetUserNameA
shell32
ShellExecuteA
wininet
InternetCrackUrlA
InternetCreateUrlA
shlwapi
StrStrIA
StrRChrIA
StrToIntA
StrStrA
StrCmpNIA
StrStrIW
wsock32
inet_addr
gethostbyname
socket
connect
closesocket
send
select
recv
setsockopt
WSAStartup
userenv
LoadUserProfileA
UnloadUserProfile
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE