General
-
Target
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790
-
Size
128KB
-
Sample
240902-f79z3atglh
-
MD5
cbaa3e593fda53eac05108ac02843a01
-
SHA1
5889f12852e7f39333a9582e9c87130f5919a15f
-
SHA256
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790
-
SHA512
f2d0c7e30b48cdbe0577ade1e8e0fd20761300f264ed1a93c7b79cfe421afeddd9ea286b5bae19e964857c342882f2d106bc39c5d9b4080c55783c4fb5af7bb0
-
SSDEEP
3072:uGHi6mwTvTbCsJ3JBt31C9HQRma45OWAB/vu5y95:+wvysJ3JB3dRmTOWAB3
Static task
static1
Behavioral task
behavioral1
Sample
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://209.59.219.90/forum/viewtopic.php
-
payload_url
http://ctl-mexico.com/WtgME.exe
http://cvilleshootingstars.com/JzU.exe
http://ctamdq.org.ar/bigQm.exe
Targets
-
-
Target
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790
-
Size
128KB
-
MD5
cbaa3e593fda53eac05108ac02843a01
-
SHA1
5889f12852e7f39333a9582e9c87130f5919a15f
-
SHA256
eda06a5366e9cc4f2c45204fe0d3716da1df931ec55c287cce390fbcd8782790
-
SHA512
f2d0c7e30b48cdbe0577ade1e8e0fd20761300f264ed1a93c7b79cfe421afeddd9ea286b5bae19e964857c342882f2d106bc39c5d9b4080c55783c4fb5af7bb0
-
SSDEEP
3072:uGHi6mwTvTbCsJ3JBt31C9HQRma45OWAB/vu5y95:+wvysJ3JB3dRmTOWAB3
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-