General
-
Target
2FBFC79462B64751C339F0B0297C748F.exe
-
Size
372KB
-
Sample
241207-vzt17ssmdm
-
MD5
2fbfc79462b64751c339f0b0297c748f
-
SHA1
3c07b52af2661e02e4db7dc978a83db0ba7c570f
-
SHA256
2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835
-
SHA512
dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827
-
SSDEEP
3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg
Static task
static1
Behavioral task
behavioral1
Sample
2FBFC79462B64751C339F0B0297C748F.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2FBFC79462B64751C339F0B0297C748F.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://6.magicalomaha.co/forum/viewtopic.php
http://6.magicalomaha.com/forum/viewtopic.php
-
payload_url
http://dynamotouren.de/4XM2f.exe
http://app.bi.com.tr/fPFa.exe
http://72.32.185.12/rd7nr.exe
http://208.116.13.164/b6dK7rwV.exe
http://www.seigner-art.at/fPsx8i.exe
http://www.aboessen24.de/WWkULwkq.exe
Targets
-
-
Target
2FBFC79462B64751C339F0B0297C748F.exe
-
Size
372KB
-
MD5
2fbfc79462b64751c339f0b0297c748f
-
SHA1
3c07b52af2661e02e4db7dc978a83db0ba7c570f
-
SHA256
2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835
-
SHA512
dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827
-
SSDEEP
3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-