General
-
Target
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066N
-
Size
112KB
-
Sample
241010-day57awakh
-
MD5
1e4cee7b00937addc94f660c42454100
-
SHA1
6e51c5ae723b89dda233fcaa853d777a97f39066
-
SHA256
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066
-
SHA512
6ff4d474d1ae63a9dcb8b592d5983bf83e288b9609441d2c13de102e60294047ed0920b639ece993950b45224944e1a3ac675b740530bd4be168e9d92198e8ae
-
SSDEEP
3072:Zw/VBNqK5cPwPLIbvK4PC81CTl3a7G8W8MKdc:bKuPYcKf8cTwquMKdc
Static task
static1
Behavioral task
behavioral1
Sample
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://setandforgetwebsites.net/ponyz/gate.php
http://smallproductphotos.com/ponyz/gate.php
http://timetoeatout.com/ponyz/gate.php
http://mypersonalpathtopregnancy.com/ponyz/gate.php
-
payload_url
http://ashisha.info/Q1VH1.exe
http://www.surfincubator.pacificcrm.com/rLG.exe
http://test.iboitalia.org/C7oaNwB.exe
Targets
-
-
Target
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066N
-
Size
112KB
-
MD5
1e4cee7b00937addc94f660c42454100
-
SHA1
6e51c5ae723b89dda233fcaa853d777a97f39066
-
SHA256
f6b888fc2dceb9240e597738366e4a335ad866445f5054b4905b50ec4bafe066
-
SHA512
6ff4d474d1ae63a9dcb8b592d5983bf83e288b9609441d2c13de102e60294047ed0920b639ece993950b45224944e1a3ac675b740530bd4be168e9d92198e8ae
-
SSDEEP
3072:Zw/VBNqK5cPwPLIbvK4PC81CTl3a7G8W8MKdc:bKuPYcKf8cTwquMKdc
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-