General
-
Target
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b.exe
-
Size
113KB
-
Sample
241202-ld4h3svmdp
-
MD5
abf9e6a19188c280a8402ea7a141f1cc
-
SHA1
d3abec862715e0acf44e062667564af3ef2d07a9
-
SHA256
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b
-
SHA512
d2fb30ee5a38cc1c68ccc1082eae5c0ae7cbd2613f217ec5d14955db1f1f8fbccc4bc08c86c067f833b42b6cb57bdba8ae260c87dd4f36ababa2a1e690c6e599
-
SSDEEP
1536:HCW3sBK3avjaHyimb4lpXlz/AoJut3pdTrjlpVMJ+XbwDotizl7D4tjU+:Hj3SK3aLaHppVz/vuDT9piJ1zl34tjU+
Static task
static1
Behavioral task
behavioral1
Sample
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://hitechcreature.com/forum/viewtopic.php
http://industryseeds.ca/forum/viewtopic.php
http://infocreature.com/forum/viewtopic.php
http://itanimal.com/forum/viewtopic.php
-
payload_url
http://www.reggaeband.de/3rx.exe
http://gardelco.com/oaNhfFk.exe
http://rfsystem.co.kr/uvGk4y.exe
http://ftp.ronco.ca/spv5.exe
Targets
-
-
Target
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b.exe
-
Size
113KB
-
MD5
abf9e6a19188c280a8402ea7a141f1cc
-
SHA1
d3abec862715e0acf44e062667564af3ef2d07a9
-
SHA256
13b91c23a90a78f3651646bce6d77e8cb091dc199f95f85715729252f3c6590b
-
SHA512
d2fb30ee5a38cc1c68ccc1082eae5c0ae7cbd2613f217ec5d14955db1f1f8fbccc4bc08c86c067f833b42b6cb57bdba8ae260c87dd4f36ababa2a1e690c6e599
-
SSDEEP
1536:HCW3sBK3avjaHyimb4lpXlz/AoJut3pdTrjlpVMJ+XbwDotizl7D4tjU+:Hj3SK3aLaHppVz/vuDT9piJ1zl34tjU+
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-