General
-
Target
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70N
-
Size
111KB
-
Sample
241101-xxybysthka
-
MD5
7abf713361b13d49747f9502a7c767a0
-
SHA1
6b4f0a916eae9a2e9657d718c7abcd11fb4eb18a
-
SHA256
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70
-
SHA512
48d78bc48c90694a078075a448ee89b4d79a49efacd0435691bd5ceb2a70175b8f08602e7a3550b08b420b82872c5f9d6d52712f6c86f4372ab705fbd45032cc
-
SSDEEP
1536:eauGzN3JcY1V78adnVjSTJdczVY4B/cHHj+lMFVLfYY+O1a9u:eyDbHdn9GJOBY4B/cHHjyWLQY+p0
Static task
static1
Behavioral task
behavioral1
Sample
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://xkowuqiu.info:719/way/open.php
http://viwunsyi.info:719/way/open.php
Targets
-
-
Target
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70N
-
Size
111KB
-
MD5
7abf713361b13d49747f9502a7c767a0
-
SHA1
6b4f0a916eae9a2e9657d718c7abcd11fb4eb18a
-
SHA256
6add42273c93873dcb1d3750f26db53117a6117311db2ea147e0db3ee7bfed70
-
SHA512
48d78bc48c90694a078075a448ee89b4d79a49efacd0435691bd5ceb2a70175b8f08602e7a3550b08b420b82872c5f9d6d52712f6c86f4372ab705fbd45032cc
-
SSDEEP
1536:eauGzN3JcY1V78adnVjSTJdczVY4B/cHHj+lMFVLfYY+O1a9u:eyDbHdn9GJOBY4B/cHHjyWLQY+p0
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-