General
-
Target
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac
-
Size
250KB
-
Sample
241215-1lk42azmek
-
MD5
5fd8c0a425255c3eb8972a3e2d5ad810
-
SHA1
fbc67cb81231a53bb9fef7b4c2e92d5c670b9625
-
SHA256
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac
-
SHA512
4acc1138e1b1c04bc20a35871d72c5838e0ca5af75b6e435fd6e304e3dd40ba0fa6a7a4b9ae96aec4318c6cb327f416b83bdf1c24b6a713dd4a2f2eb5da48720
-
SSDEEP
3072:1VIf+rqpDAoBxgfWsopbVTd5E8SNolOW1NN2e08CeVA4Rjt:1VIfEMDAoBxHpZ08SEjtZ
Behavioral task
behavioral1
Sample
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://beheutsi.ru/gate.php
http://fievenghapun.ru/gate.php
http://juskinsandfo.ru/gate.php
-
payload_url
http://gourmet.pergaz.com/media/system/host.exe
http://yeebay.co/media/system/host.exe
http://hungphatea.com.au/media/system/host.exe
Targets
-
-
Target
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac
-
Size
250KB
-
MD5
5fd8c0a425255c3eb8972a3e2d5ad810
-
SHA1
fbc67cb81231a53bb9fef7b4c2e92d5c670b9625
-
SHA256
685630bc62de6b7700f0370419e102fed425f60e764c2a76473336a0f6f2c7ac
-
SHA512
4acc1138e1b1c04bc20a35871d72c5838e0ca5af75b6e435fd6e304e3dd40ba0fa6a7a4b9ae96aec4318c6cb327f416b83bdf1c24b6a713dd4a2f2eb5da48720
-
SSDEEP
3072:1VIf+rqpDAoBxgfWsopbVTd5E8SNolOW1NN2e08CeVA4Rjt:1VIfEMDAoBxHpZ08SEjtZ
-
Pony family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-