General
-
Target
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25eN
-
Size
144KB
-
Sample
241016-h9fkcaygnd
-
MD5
04355cf8f2d1346dd0f859cac49dab30
-
SHA1
03002fa5d5c1af960e1060abc3757e52a213aeee
-
SHA256
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25e
-
SHA512
fe079b92b5f4d2095eece7b412a02556d1edb528fdfe0c6e687bb0d1fd1aacb2dc2f3525f6bc11b05d71105c2dd731bf1c11cb8c2b047da84c2da1705428fdf5
-
SSDEEP
1536:ImZcI1AOMj3n0yBKjQQDObCi3Yb44BJ4o4kGYjlToHhbgKB/GenmyfyNJzmK:Imiz0yIQS4a4kGclTCyU/GE6NtmK
Static task
static1
Behavioral task
behavioral1
Sample
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25eN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://engrseltevs.com/okey/gate.php
Targets
-
-
Target
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25eN
-
Size
144KB
-
MD5
04355cf8f2d1346dd0f859cac49dab30
-
SHA1
03002fa5d5c1af960e1060abc3757e52a213aeee
-
SHA256
5c405d375a1cfe1ed2903f895336085632347f92caf93a0aaa6d780d52ecd25e
-
SHA512
fe079b92b5f4d2095eece7b412a02556d1edb528fdfe0c6e687bb0d1fd1aacb2dc2f3525f6bc11b05d71105c2dd731bf1c11cb8c2b047da84c2da1705428fdf5
-
SSDEEP
1536:ImZcI1AOMj3n0yBKjQQDObCi3Yb44BJ4o4kGYjlToHhbgKB/GenmyfyNJzmK:Imiz0yIQS4a4kGclTCyU/GE6NtmK
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-