General
-
Target
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41N.exe
-
Size
190KB
-
Sample
240925-gzqrwszbkp
-
MD5
ee77aefc8509c87219f66cda9ab69540
-
SHA1
3daffdebb3d9d94e7750606007d38903a6d7c3ac
-
SHA256
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41
-
SHA512
dae22580efb4120f88598aff8c4ebc47d5bc84a5718839623ca1e9d518c6482ddc44b2086cc379711b9f2fc33c8244962615a4b9f2cd6f1899edb58a1824561b
-
SSDEEP
3072:g86n4R9ZIo3M9MP5UW+f+ZXPqL/lcxMW+oV30S4:g8cKr89k5UW+G4L/7zo1O
Static task
static1
Behavioral task
behavioral1
Sample
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://classicmodels.at:8080/forum/viewtopic.php
http://diva-code.at:8080/forum/viewtopic.php
-
payload_url
http://bymcomunica.com.br/1jWUh8g.exe
http://ftp.architektur-gleis.at/i3NiK11U.exe
http://3d-cam.com/5361PU.exe
Targets
-
-
Target
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41N.exe
-
Size
190KB
-
MD5
ee77aefc8509c87219f66cda9ab69540
-
SHA1
3daffdebb3d9d94e7750606007d38903a6d7c3ac
-
SHA256
0f61a735f31e801556583fc099bc774cd35ebc3f9f710deafba36c6d563fcb41
-
SHA512
dae22580efb4120f88598aff8c4ebc47d5bc84a5718839623ca1e9d518c6482ddc44b2086cc379711b9f2fc33c8244962615a4b9f2cd6f1899edb58a1824561b
-
SSDEEP
3072:g86n4R9ZIo3M9MP5UW+f+ZXPqL/lcxMW+oV30S4:g8cKr89k5UW+G4L/7zo1O
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-