General
-
Target
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddebN
-
Size
103KB
-
Sample
241023-njt8psyhlr
-
MD5
401349071aea59c909cf9c192fcd5630
-
SHA1
ab57b6b84b1276244b956c3b45fed55415d75315
-
SHA256
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddeb
-
SHA512
d6b922a7c8499e66136be0c094012613e502a6e3693f9e8ea748ec5113460bd0326433db0e06fe197b3b14eab9778ea980f348a631fc96cf2f54b07b0be664be
-
SSDEEP
1536:dIe+JSadL57sKFA7NOGTqvuKyYURnVPxvqcMm4s3XQnfDwJzxPLv+fL:GlJSadV7dFYveG8+qm4WXQ0JzxSD
Static task
static1
Behavioral task
behavioral1
Sample
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddebN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddebN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://115.47.49.181/xSZ64Wiax/ojXVZBxRQVfp6gAUziCGnB8V7Aikbs0Z.php
Targets
-
-
Target
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddebN
-
Size
103KB
-
MD5
401349071aea59c909cf9c192fcd5630
-
SHA1
ab57b6b84b1276244b956c3b45fed55415d75315
-
SHA256
d6f5a2f1592df2f3cea2aa6bb6beaa9511881e6e176cf637a97b40c8c9d1ddeb
-
SHA512
d6b922a7c8499e66136be0c094012613e502a6e3693f9e8ea748ec5113460bd0326433db0e06fe197b3b14eab9778ea980f348a631fc96cf2f54b07b0be664be
-
SSDEEP
1536:dIe+JSadL57sKFA7NOGTqvuKyYURnVPxvqcMm4s3XQnfDwJzxPLv+fL:GlJSadV7dFYveG8+qm4WXQ0JzxSD
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-