General
-
Target
key.exe
-
Size
103KB
-
Sample
240902-sjtz6atfnh
-
MD5
d81d50327fd3ccb4bdebc70c29f9bedb
-
SHA1
827204202faf7a69fd796f7904666e55b004969e
-
SHA256
b08a4b2e818c2cea901bf41daa162722ded8a3136a38c207538ac913eb8767d7
-
SHA512
0997f874c4e9441ada20ffafe3d9a05880823a260cc90defa3756457d72d628b5258ac85ce90336359f15fa93e169871ef7227923f41255becea24349ecaddb9
-
SSDEEP
1536:vt8UEN3YqiqTLEcW+L9gs2rS+TTYz52kqnjQXyAOrc6neTvUkzbklql/2fqh:Ch1H1W9+eNkdOrDn+0ql/2fqh
Behavioral task
behavioral1
Sample
key.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
key.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
key.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
key.exe
Resource
win11-20240802-en
Malware Config
Extracted
pony
http://top.enkey.click/bussin/gate.php
Targets
-
-
Target
key.exe
-
Size
103KB
-
MD5
d81d50327fd3ccb4bdebc70c29f9bedb
-
SHA1
827204202faf7a69fd796f7904666e55b004969e
-
SHA256
b08a4b2e818c2cea901bf41daa162722ded8a3136a38c207538ac913eb8767d7
-
SHA512
0997f874c4e9441ada20ffafe3d9a05880823a260cc90defa3756457d72d628b5258ac85ce90336359f15fa93e169871ef7227923f41255becea24349ecaddb9
-
SSDEEP
1536:vt8UEN3YqiqTLEcW+L9gs2rS+TTYz52kqnjQXyAOrc6neTvUkzbklql/2fqh:Ch1H1W9+eNkdOrDn+0ql/2fqh
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-