General
-
Target
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c.exe
-
Size
100KB
-
Sample
241128-amcwyatjam
-
MD5
d5e546233519716fa264d9456bdc266c
-
SHA1
2d8d1267a92c5f4848921c9e11405561c06104c7
-
SHA256
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c
-
SHA512
a6ae07a48f59d38985c41d337b38970ddb407dda10c5cf6fc46e39c2a0d5257bcdaba353330d5214929e4f112634ccdacaba3ab48e028746754bbc0a32ad96cf
-
SSDEEP
3072:rb8eh5TyMK8uuB2qI65gD+vzur9zzMxoelvWVLmNeQR9ssp:seh5Tydusgq+v6JE+Z5mNfbssp
Static task
static1
Behavioral task
behavioral1
Sample
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://115.47.49.181/xSZ64Wiax/ojXVZBxRQVfp6gAUziCGnB8V7Aikbs0Z.php
Targets
-
-
Target
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c.exe
-
Size
100KB
-
MD5
d5e546233519716fa264d9456bdc266c
-
SHA1
2d8d1267a92c5f4848921c9e11405561c06104c7
-
SHA256
ddd7df06010d30d68189757df3b82d8556eb2c4890aa32ef4f74117e636feb7c
-
SHA512
a6ae07a48f59d38985c41d337b38970ddb407dda10c5cf6fc46e39c2a0d5257bcdaba353330d5214929e4f112634ccdacaba3ab48e028746754bbc0a32ad96cf
-
SSDEEP
3072:rb8eh5TyMK8uuB2qI65gD+vzur9zzMxoelvWVLmNeQR9ssp:seh5Tydusgq+v6JE+Z5mNfbssp
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-