General
-
Target
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046
-
Size
511KB
-
Sample
240908-wawn6syelk
-
MD5
2ef77c3871cb4bf16e17c971164a3b94
-
SHA1
6defe90693272c1821e2459c9ca748d077a316e1
-
SHA256
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046
-
SHA512
0219683735121dbdcffafb1fef7ee5bdb77f12ec971b8a570c190613b5e8d8626695f2e4a43cb88bd740873cc89394fb82bdb5c9438a4fd36d5b0c6f07740aba
-
SSDEEP
3072:li97HJLI3YI/TRdoNf8CUjTnVgM6mjLLW:Y927vTVvDfL
Static task
static1
Behavioral task
behavioral1
Sample
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://etsiunjour.fr:81/pony/gate.php
http://69.194.194.238/pony/gate.php
-
payload_url
http://udveksling.cadesignform.dk/exFX.exe
http://bestyun.sshel.com/Lsqu.exe
http://asaptax.com/xKkq.exe
Targets
-
-
Target
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046
-
Size
511KB
-
MD5
2ef77c3871cb4bf16e17c971164a3b94
-
SHA1
6defe90693272c1821e2459c9ca748d077a316e1
-
SHA256
175fa449a9c2ce139212493b4aeb5d1b98cd9f65b8b1eb13ff0d6ca8ca6d4046
-
SHA512
0219683735121dbdcffafb1fef7ee5bdb77f12ec971b8a570c190613b5e8d8626695f2e4a43cb88bd740873cc89394fb82bdb5c9438a4fd36d5b0c6f07740aba
-
SSDEEP
3072:li97HJLI3YI/TRdoNf8CUjTnVgM6mjLLW:Y927vTVvDfL
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-