General
-
Target
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8fN
-
Size
106KB
-
Sample
241004-kzv86avglm
-
MD5
0307721f6343a0fd0aa415eefe210f90
-
SHA1
83d92750bc96b3194c1616fb7696a86f3924dda1
-
SHA256
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8f
-
SHA512
633f2a5a0a27ab6dba1f0f2a12a3f1f8b5223867d31f9f5ba31080b4adb2566b3ae2d028775cfedc45920aabf2f90d3f7ef2d132715aeaf3fc7d380a47aa1ff0
-
SSDEEP
3072:/z1r6cA/CAN6mHMQOQ0ZS8hIwfO2owMFJ29wEj:/z4bCrmHMfQh8hIwDow6w9Bj
Static task
static1
Behavioral task
behavioral1
Sample
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8fN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://184.172.134.62:8080/pony/gate.php
http://108.178.59.22/pony/gate.php
-
payload_url
http://penadokum.com/NbwwUH3k/b0CpDvLo.exe
http://millanta.com/kYwJSdk7/KAnx.exe
http://heenamkim.com/Jq6aoUkD/kE4P.exe
http://danymartin.com.ar/uMzLt6co/UVz.exe
Targets
-
-
Target
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8fN
-
Size
106KB
-
MD5
0307721f6343a0fd0aa415eefe210f90
-
SHA1
83d92750bc96b3194c1616fb7696a86f3924dda1
-
SHA256
e6310f77ccf5c88f01a830c371231719f2e0885d0d3989b7d7ee5915e2bc5f8f
-
SHA512
633f2a5a0a27ab6dba1f0f2a12a3f1f8b5223867d31f9f5ba31080b4adb2566b3ae2d028775cfedc45920aabf2f90d3f7ef2d132715aeaf3fc7d380a47aa1ff0
-
SSDEEP
3072:/z1r6cA/CAN6mHMQOQ0ZS8hIwfO2owMFJ29wEj:/z4bCrmHMfQh8hIwDow6w9Bj
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-