General
-
Target
2080-2-0x0000000000400000-0x0000000000417000-memory.dmp
-
Size
92KB
-
Sample
240830-zzvpyswhkn
-
MD5
cce847a0957b76d64d5301478cfb8045
-
SHA1
faea2ca4c08ab54dc754c5c54bd1ad6f2e558e3d
-
SHA256
9fbd0d0a6f4933caedf0dfbba09b3009a155855c4edd331465f94969ed9832f8
-
SHA512
3858af0cbd7193adf6e77e8bfe8b0713cb231e481c761085191d8e9dc7caac38a2f69a2e181101d462a618ca711694d777d1fe97e393eb76649b0b7e36868b75
-
SSDEEP
1536:lSHv2KkqT0gNItvPtTxM35w4gzr1TvJEA9kZsS:l6RutHttM35w3EAOsS
Behavioral task
behavioral1
Sample
2080-2-0x0000000000400000-0x0000000000417000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2080-2-0x0000000000400000-0x0000000000417000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://www.alberghi.com:8080/pony/gate.php
http://zelia.net:8080/pony/gate.php
-
payload_url
http://ucargroup.com/3m6CzuvT/UyqJ.exe
http://geovanabauerdocesfinos.com.br/6md3zev5/hQj.exe
http://www.dwa-wrestling.de/DGUhkavQ/SkxZGut.exe
Targets
-
-
Target
2080-2-0x0000000000400000-0x0000000000417000-memory.dmp
-
Size
92KB
-
MD5
cce847a0957b76d64d5301478cfb8045
-
SHA1
faea2ca4c08ab54dc754c5c54bd1ad6f2e558e3d
-
SHA256
9fbd0d0a6f4933caedf0dfbba09b3009a155855c4edd331465f94969ed9832f8
-
SHA512
3858af0cbd7193adf6e77e8bfe8b0713cb231e481c761085191d8e9dc7caac38a2f69a2e181101d462a618ca711694d777d1fe97e393eb76649b0b7e36868b75
-
SSDEEP
1536:lSHv2KkqT0gNItvPtTxM35w4gzr1TvJEA9kZsS:l6RutHttM35w3EAOsS
Score3/10 -