General
-
Target
8d3132c1473de82bba3997038e9ba2482b503a03692105cf947a1c029235f83aN.exe
-
Size
99KB
-
Sample
241129-tww6qazlcl
-
MD5
a3bf414a1174afe528d6655fb8bd3960
-
SHA1
2ea94f9e06d37e19c1ba563832e8429a77b07ba7
-
SHA256
8d3132c1473de82bba3997038e9ba2482b503a03692105cf947a1c029235f83a
-
SHA512
81c54ef814d6611119f26be386627c08c9e32821b275d5b084fd82c6efd30f0a3c53ff88403723caec76a412c4e0e73afcdaf4b52c07344abdef1e86ea29a6ce
-
SSDEEP
3072:fjytSHNiP8NcYKLtZeG8KR8z/Cgdt1Al:WtStiC/K5ZAKRS/Cot1Al
Static task
static1
Behavioral task
behavioral1
Sample
8d3132c1473de82bba3997038e9ba2482b503a03692105cf947a1c029235f83aN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://kjytrf.pw:4915/doc/black.php
http://kjytrf.pw:888/doc/black.php
-
payload_url
http://jytrru.pw:888/pic/Flash.exe
Targets
-
-
Target
8d3132c1473de82bba3997038e9ba2482b503a03692105cf947a1c029235f83aN.exe
-
Size
99KB
-
MD5
a3bf414a1174afe528d6655fb8bd3960
-
SHA1
2ea94f9e06d37e19c1ba563832e8429a77b07ba7
-
SHA256
8d3132c1473de82bba3997038e9ba2482b503a03692105cf947a1c029235f83a
-
SHA512
81c54ef814d6611119f26be386627c08c9e32821b275d5b084fd82c6efd30f0a3c53ff88403723caec76a412c4e0e73afcdaf4b52c07344abdef1e86ea29a6ce
-
SSDEEP
3072:fjytSHNiP8NcYKLtZeG8KR8z/Cgdt1Al:WtStiC/K5ZAKRS/Cot1Al
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3