General
-
Target
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74N
-
Size
927KB
-
Sample
241103-yhfn2aseqh
-
MD5
cea171614ebd43ad72d117982fa9ad60
-
SHA1
e1be459c2b5dd0c7d04c42ab40e68d9ad423b096
-
SHA256
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74
-
SHA512
054ce2d78043c3a2c884de2b32f87509ceb13cb3cd605188c5349106d18f7821eb3aa71a47645921f9b523542a41ec567ced3fefc5991d25d9112a88dfee3a25
-
SSDEEP
12288:JmscvqUKJ8TGJMhXAG5XleoNOsZJ/dPNazsja54sQ0wudwW3bymaYkBFN:M1v9wChXn5XlesV1Nj4Q0wzcGVBF
Static task
static1
Behavioral task
behavioral1
Sample
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://jagconsulting.webimpakt-green.com/wp-admin/ejima/gate.php
Targets
-
-
Target
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74N
-
Size
927KB
-
MD5
cea171614ebd43ad72d117982fa9ad60
-
SHA1
e1be459c2b5dd0c7d04c42ab40e68d9ad423b096
-
SHA256
3ee7acbf8f89f0dd80405dcf3d26285531c1b4746a69dd09d5d38603de965e74
-
SHA512
054ce2d78043c3a2c884de2b32f87509ceb13cb3cd605188c5349106d18f7821eb3aa71a47645921f9b523542a41ec567ced3fefc5991d25d9112a88dfee3a25
-
SSDEEP
12288:JmscvqUKJ8TGJMhXAG5XleoNOsZJ/dPNazsja54sQ0wudwW3bymaYkBFN:M1v9wChXn5XlesV1Nj4Q0wzcGVBF
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-