General
-
Target
945fd0be735b1861056ab0c2796a307cf7e1b1484fd7ec42a1c99fa8caa69a3c
-
Size
448KB
-
Sample
240909-s924fsydre
-
MD5
1a304cbb2e41d35ba1ba596a2cf482bd
-
SHA1
e88715507e4983f4980ad1e90a5f2979332668e3
-
SHA256
945fd0be735b1861056ab0c2796a307cf7e1b1484fd7ec42a1c99fa8caa69a3c
-
SHA512
47147f0812c416bcc4e8037eef4c1ce96c9a44e92ff56f5a377743ac592806465730dc46509a99b2b1a43b979d51fee74068e93024beec393d1be1e925ba2ef9
-
SSDEEP
3072:A4ghhk6we83ZXmMB5rj8eqwtJE++XlUw6dfpb:ALhh+eqZXLBR+K+VUwG
Static task
static1
Behavioral task
behavioral1
Sample
945fd0be735b1861056ab0c2796a307cf7e1b1484fd7ec42a1c99fa8caa69a3c.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://200.72.183.54:81/pony/gate.php
http://91.121.84.204:8080/pony/gate.php
-
payload_url
http://astrum-rybka.ru/CUyfRYaU/JrhtN.exe
http://hermesdiepenbeek.be/5sGmi7RJ/ZSY.exe
http://brilhanteservice.com.br/rQuTTn7k/mkE.exe
Targets
-
-
Target
945fd0be735b1861056ab0c2796a307cf7e1b1484fd7ec42a1c99fa8caa69a3c
-
Size
448KB
-
MD5
1a304cbb2e41d35ba1ba596a2cf482bd
-
SHA1
e88715507e4983f4980ad1e90a5f2979332668e3
-
SHA256
945fd0be735b1861056ab0c2796a307cf7e1b1484fd7ec42a1c99fa8caa69a3c
-
SHA512
47147f0812c416bcc4e8037eef4c1ce96c9a44e92ff56f5a377743ac592806465730dc46509a99b2b1a43b979d51fee74068e93024beec393d1be1e925ba2ef9
-
SSDEEP
3072:A4ghhk6we83ZXmMB5rj8eqwtJE++XlUw6dfpb:ALhh+eqZXLBR+K+VUwG
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-