General
-
Target
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515.exe
-
Size
279KB
-
Sample
241201-xmzr2atkfr
-
MD5
e01849b4cd15e4e7d3d83f6d4d7e78a0
-
SHA1
ff55f91339719257645740021fe8763b895c93a7
-
SHA256
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515
-
SHA512
e0f5e043d47faf3fcca01f8284709a5dca78e2cff133ac6b7e7f6569082264b9aec108798c1452490dea8530608745df2e5ce101476f31e93a46b11fcd4192f3
-
SSDEEP
3072:QOCSgal/jOxAk31p1k8oLM9HXmR5jqKFYwwnwMyVEvUFKfxq3YsalGveeCH3zuQS:GKjFcgEv7J9t3HQ/b
Static task
static1
Behavioral task
behavioral1
Sample
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://sensustraducciones.com/media/breezingforms/themes/panelnew/admin.php
-
payload_url
http://sensustraducciones.com/media/breezingforms/themes/panelnew/gate.php.exe
Targets
-
-
Target
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515.exe
-
Size
279KB
-
MD5
e01849b4cd15e4e7d3d83f6d4d7e78a0
-
SHA1
ff55f91339719257645740021fe8763b895c93a7
-
SHA256
8a6e6a961f80cca9fc50354606826689c70c69d83e8d38298770f964fa250515
-
SHA512
e0f5e043d47faf3fcca01f8284709a5dca78e2cff133ac6b7e7f6569082264b9aec108798c1452490dea8530608745df2e5ce101476f31e93a46b11fcd4192f3
-
SSDEEP
3072:QOCSgal/jOxAk31p1k8oLM9HXmR5jqKFYwwnwMyVEvUFKfxq3YsalGveeCH3zuQS:GKjFcgEv7J9t3HQ/b
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-