General
-
Target
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5.exe
-
Size
164KB
-
Sample
241205-yg8y7aypcy
-
MD5
734675ddf4fdd577f35f386fc17eea0c
-
SHA1
27d4efca2abfaf2c4df9c2ed301f2b1a6f0059d1
-
SHA256
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5
-
SHA512
eeb15b62b6c36849c752f5f9156bdbc4510db0f3241784131e7db1afa56714c61bbe918a808ae5e9cb01215edf4b4759d7569688302222ad57a361a8272535af
-
SSDEEP
3072:uF+5QvmXYFudWtB/joxx2Fg1G5Opp4JW1svgYiqjWwwIU70vi8:O+NddW7/EiQIIpuW1svgwWwJO0vN
Static task
static1
Behavioral task
behavioral1
Sample
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://123.108.108.52/xSZ64Wiax/didzyo.php
Targets
-
-
Target
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5.exe
-
Size
164KB
-
MD5
734675ddf4fdd577f35f386fc17eea0c
-
SHA1
27d4efca2abfaf2c4df9c2ed301f2b1a6f0059d1
-
SHA256
c1bc01da755f8df79b77958cc2719c96b0e965989b922b64e8e4f4226e04dbf5
-
SHA512
eeb15b62b6c36849c752f5f9156bdbc4510db0f3241784131e7db1afa56714c61bbe918a808ae5e9cb01215edf4b4759d7569688302222ad57a361a8272535af
-
SSDEEP
3072:uF+5QvmXYFudWtB/joxx2Fg1G5Opp4JW1svgYiqjWwwIU70vi8:O+NddW7/EiQIIpuW1svgwWwJO0vN
-
Pony family
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-