General
-
Target
0baa9898b7c468c31c7f3432b317527a7141a6d2504a74a664a2ce32145d1b02
-
Size
447KB
-
Sample
240909-ta3flswflj
-
MD5
eb21da04e7998d3f570389bef70a47d1
-
SHA1
f41b8e23aa80a803de5ac3d73ca7fd03aa49e3c8
-
SHA256
0baa9898b7c468c31c7f3432b317527a7141a6d2504a74a664a2ce32145d1b02
-
SHA512
ce19c32968d461ea7b87bf537c12783831c68bbc3c970637e0ce9a6513c4ca7fec83c77f323a1eb4dac8ff4c8a4ebe8df39cc8213a40ce26996dd9ef73a8899b
-
SSDEEP
1536:6Fum7foiQM569feOHQbQv48GbxRzqCqZKsUFwBcWIu8LB7LAwj+ybP/F8vCAXm:8QZCafeOHjv81gCqkhwBA1T+yb3v
Static task
static1
Behavioral task
behavioral1
Sample
0baa9898b7c468c31c7f3432b317527a7141a6d2504a74a664a2ce32145d1b02.exe
Resource
win7-20240704-en
Malware Config
Extracted
pony
http://dare2dreamz.com:8080/pony/gate.php
http://cityweddingguide.com:8080/pony/gate.php
-
payload_url
http://dynolite.eu/7U0ASvP9/AZz.exe
http://bodyarchitect.pl/Y18tPF6Q/tbZKb.exe
http://redman.com.br/zqDQMaNF/SRivXt.exe
Targets
-
-
Target
0baa9898b7c468c31c7f3432b317527a7141a6d2504a74a664a2ce32145d1b02
-
Size
447KB
-
MD5
eb21da04e7998d3f570389bef70a47d1
-
SHA1
f41b8e23aa80a803de5ac3d73ca7fd03aa49e3c8
-
SHA256
0baa9898b7c468c31c7f3432b317527a7141a6d2504a74a664a2ce32145d1b02
-
SHA512
ce19c32968d461ea7b87bf537c12783831c68bbc3c970637e0ce9a6513c4ca7fec83c77f323a1eb4dac8ff4c8a4ebe8df39cc8213a40ce26996dd9ef73a8899b
-
SSDEEP
1536:6Fum7foiQM569feOHQbQv48GbxRzqCqZKsUFwBcWIu8LB7LAwj+ybP/F8vCAXm:8QZCafeOHjv81gCqkhwBA1T+yb3v
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-