General
-
Target
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe
-
Size
498KB
-
Sample
240820-clcwnasdrp
-
MD5
0dc91d39870a081f44b8429dcfbc223f
-
SHA1
2033cf336c22ca200e212333a4ebecfc25eeb43f
-
SHA256
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb
-
SHA512
6cd2218a0bb9bc4b177173d03076a1af59a6d1f38dac7fc5f1d7a89c385b4205490706a8c44e34551ba237e585ffeb26f42b7dd6e902754d6a6a16f07000dddd
-
SSDEEP
12288:C9Y0A+J8888888x8MnBOky33qKQRaVogh8juqjYFa4n+Fo6xg:gnPJ8888888x8MnBg33qKQRaVogh8jJE
Static task
static1
Behavioral task
behavioral1
Sample
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://dillion0mill.favcc1.com/gate.php
Targets
-
-
Target
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb.exe
-
Size
498KB
-
MD5
0dc91d39870a081f44b8429dcfbc223f
-
SHA1
2033cf336c22ca200e212333a4ebecfc25eeb43f
-
SHA256
f1114e448e0d95855b4124a0cc4fc0b601e187db29ec697128bee4d776c6eccb
-
SHA512
6cd2218a0bb9bc4b177173d03076a1af59a6d1f38dac7fc5f1d7a89c385b4205490706a8c44e34551ba237e585ffeb26f42b7dd6e902754d6a6a16f07000dddd
-
SSDEEP
12288:C9Y0A+J8888888x8MnBOky33qKQRaVogh8juqjYFa4n+Fo6xg:gnPJ8888888x8MnBg33qKQRaVogh8jJE
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-