General
-
Target
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140N.exe
-
Size
128KB
-
Sample
241205-tzs88symdr
-
MD5
030bde0a698bbc103e43756525cd7320
-
SHA1
3be6b03cd1157b4783e9f1d17749596035adbe03
-
SHA256
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140
-
SHA512
91ac28fd6859ae2493879a88af7e60688507cf0dc6f7c90dc7e3e0b860e504042b9ec9d4f30d3fac88a4c89fbaa1f7ec3ea6d07456dc92895ef12c432886780e
-
SSDEEP
3072:ULselXPVHKCid5e/Hn73w1buGLclkNkNbo2YFwmjAv:U4A/VqCize/HD6bVLclktev
Static task
static1
Behavioral task
behavioral1
Sample
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://dreago.com/ponys/gate.php
http://flipsidementoring.com/ponys/gate.php
http://herbrim.com/ponys/gate.php
http://illusioninfusion.com/ponys/gate.php
-
payload_url
http://kingdomequinecenter.com/eKZf69Hp.exe
http://02ab5c0.netsolhost.com/F7Q.exe
http://foromaquinas.net/4QE0T.exe
http://netcloud.co.il/Whx.exe
Targets
-
-
Target
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140N.exe
-
Size
128KB
-
MD5
030bde0a698bbc103e43756525cd7320
-
SHA1
3be6b03cd1157b4783e9f1d17749596035adbe03
-
SHA256
9dbf5af05ae2d45fc8ce35c33824db96200daa17a7a0c76897be03dd56749140
-
SHA512
91ac28fd6859ae2493879a88af7e60688507cf0dc6f7c90dc7e3e0b860e504042b9ec9d4f30d3fac88a4c89fbaa1f7ec3ea6d07456dc92895ef12c432886780e
-
SSDEEP
3072:ULselXPVHKCid5e/Hn73w1buGLclkNkNbo2YFwmjAv:U4A/VqCize/HD6bVLclktev
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-