General
-
Target
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666N
-
Size
128KB
-
Sample
241020-jmdmxayfpj
-
MD5
40a409b72ab86dab618fbce1356c1aa0
-
SHA1
f5f412c34488bf9d2c2a8fe5e824a86f378efd5b
-
SHA256
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666
-
SHA512
8c15a9cc27fa3587dabab0d1882e0501933a97cdf20d258498162c35e50d57b8558feeb080800fe50a414f55ba2dc0314c8e95a18d8aa873bbea111ed435134e
-
SSDEEP
1536:DLSrQO3jbViimkB2nuQ1YMisVHSWjgxPll3gPFK/yTi6MqVMLMFWzOyjmRC/0zcW:yr4kB3QYs1SWEN3kFK6TirLiWD/m
Static task
static1
Behavioral task
behavioral1
Sample
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://prospexleads.com:8080/forum/viewtopic.php
http://phonebillssuck.com:8080/forum/viewtopic.php
http://myimpactblog.com:8080/forum/viewtopic.php
http://yourprospexblog.com:8080/forum/viewtopic.php
-
payload_url
http://ciclografico.pt/9Up.exe
http://nailsbeielli.de/F0U8.exe
http://mdebra.o2switch.net/2ccVsM9z.exe
http://www.splendidhonda.com/Hb3qCt.exe
Targets
-
-
Target
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666N
-
Size
128KB
-
MD5
40a409b72ab86dab618fbce1356c1aa0
-
SHA1
f5f412c34488bf9d2c2a8fe5e824a86f378efd5b
-
SHA256
17b286ddac2ba19a2ba0c138cbb588d1b9f4475d5770025054115f8a38e91666
-
SHA512
8c15a9cc27fa3587dabab0d1882e0501933a97cdf20d258498162c35e50d57b8558feeb080800fe50a414f55ba2dc0314c8e95a18d8aa873bbea111ed435134e
-
SSDEEP
1536:DLSrQO3jbViimkB2nuQ1YMisVHSWjgxPll3gPFK/yTi6MqVMLMFWzOyjmRC/0zcW:yr4kB3QYs1SWEN3kFK6TirLiWD/m
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-