General
-
Target
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
-
Size
95KB
-
Sample
241129-a761hswrd1
-
MD5
947e80d98a8c8eda82327937f91ec3b0
-
SHA1
66392ee63d5fb6a8ea4daf066205277eb11eb06c
-
SHA256
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2
-
SHA512
4a4d7892815a9dcf1e649c9eec849a6f9478dd4ac88b650cb2cf80c124ca26c2daf8bc4a9ac71927c7411ee1a538fa9025414f0a69d382e7b93486c61c28d83c
-
SSDEEP
1536:Q87uzDyU3cDzaw6qbKXK1A7TI+a8TFM8Er3s0X0vRWs+vwM1hxN:Q87uzD/sDf6qbK61YC8TTErcN0/
Static task
static1
Behavioral task
behavioral1
Sample
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://vkdlho.pw:4915/way/like.php
http://kldlry.pw:4915/way/like.php
Targets
-
-
Target
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2N.exe
-
Size
95KB
-
MD5
947e80d98a8c8eda82327937f91ec3b0
-
SHA1
66392ee63d5fb6a8ea4daf066205277eb11eb06c
-
SHA256
32f2a10faa5da62346339ebd072c29dff2ffcd27a18dba8b40fe45dbc690a9d2
-
SHA512
4a4d7892815a9dcf1e649c9eec849a6f9478dd4ac88b650cb2cf80c124ca26c2daf8bc4a9ac71927c7411ee1a538fa9025414f0a69d382e7b93486c61c28d83c
-
SSDEEP
1536:Q87uzDyU3cDzaw6qbKXK1A7TI+a8TFM8Er3s0X0vRWs+vwM1hxN:Q87uzD/sDf6qbK61YC8TTErcN0/
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-