General
-
Target
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261eN
-
Size
196KB
-
Sample
240918-c9gjraydrd
-
MD5
dfc05a4e8e29a348af7039a78ff59270
-
SHA1
0ab922c068513cfa2401a9b2e55d879eb4830382
-
SHA256
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261e
-
SHA512
fbfb3390e981ba86f9433db30108e034aa171a9cb2da0ced1543b0e33273feb365ad9ceb51b9ab11401d610b574cd0fa88245a6aae3a28e5793f39315bbebf73
-
SSDEEP
1536:QN8X9ie1AtM1icxMYxPHS+5IQbgSl1BP8hM44V+aYSwlikUEu+EQUQXjFm9G0Ky:vX9i+p1iuHS++v07101likUEu2zL0Ky
Static task
static1
Behavioral task
behavioral1
Sample
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261eN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://etsiunjour.fr:81/pony/gate.php
http://74.91.112.151/pony/gate.php
-
payload_url
http://aeronavdata.com/eGqkMT.exe
http://isdoatcen.com/EKs8.exe
http://floriculturabm.com/QxN7r.exe
Targets
-
-
Target
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261eN
-
Size
196KB
-
MD5
dfc05a4e8e29a348af7039a78ff59270
-
SHA1
0ab922c068513cfa2401a9b2e55d879eb4830382
-
SHA256
63663eec6cbc4ced91ac730c6b4789ff67241d1fbb4d522e84c0ad0e7828261e
-
SHA512
fbfb3390e981ba86f9433db30108e034aa171a9cb2da0ced1543b0e33273feb365ad9ceb51b9ab11401d610b574cd0fa88245a6aae3a28e5793f39315bbebf73
-
SSDEEP
1536:QN8X9ie1AtM1icxMYxPHS+5IQbgSl1BP8hM44V+aYSwlikUEu+EQUQXjFm9G0Ky:vX9i+p1iuHS++v07101likUEu2zL0Ky
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-