General
-
Target
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bccN.exe
-
Size
396KB
-
Sample
241125-tf54pa1lfn
-
MD5
40e53d361b807b421c99827ab5d6c330
-
SHA1
7031fdb353401bf91781c88f8a7b0736a231f56a
-
SHA256
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bcc
-
SHA512
4c5fb9aa9e1f201ccc63d627d063b566b371994f506ddf5e335a0fdb3ffe28db962ad13d83ed796ba93b10debfaf36e188040741ffcf9d051bd9e7cd548c595b
-
SSDEEP
12288:d6Wq4aaE6KwyF5L0Y2D1PqLkNWDEuTVPQ+Z:LthEVaPqLkNWH7
Behavioral task
behavioral1
Sample
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bccN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bccN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://x12.me/pony/gate.php
Targets
-
-
Target
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bccN.exe
-
Size
396KB
-
MD5
40e53d361b807b421c99827ab5d6c330
-
SHA1
7031fdb353401bf91781c88f8a7b0736a231f56a
-
SHA256
551a103609347efbdb4bad9f72279041618ce9c4975e51fcaa06224a7b107bcc
-
SHA512
4c5fb9aa9e1f201ccc63d627d063b566b371994f506ddf5e335a0fdb3ffe28db962ad13d83ed796ba93b10debfaf36e188040741ffcf9d051bd9e7cd548c595b
-
SSDEEP
12288:d6Wq4aaE6KwyF5L0Y2D1PqLkNWDEuTVPQ+Z:LthEVaPqLkNWH7
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-