General
-
Target
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975N.exe
-
Size
121KB
-
Sample
241216-bdhlhawjhw
-
MD5
5164edc2228da64d49fd29e84ad09920
-
SHA1
3dbc1cc2ed20373497483204218ca251e6e06c11
-
SHA256
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975
-
SHA512
9a414f3059ee12108d25034b8702173a6374651b582d42cacda6abbe926a8f99bbb120d050184afe2a7b990b23828225f43a3d78b2ac9365a67d53dc1ed4e185
-
SSDEEP
3072:KPqu3dVcnpLIIOjSA59oxwZuHTWZUYTbBjGyOBKoRLHTVXPJ:Kyu3dV+LQWA/oxAbZyycRXPJ
Static task
static1
Behavioral task
behavioral1
Sample
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://26.azofficemovers.com/forum/viewtopic.php
http://27.DANIELSVANLINES.COM/forum/viewtopic.php
-
payload_url
http://67.219.46.153/p3drJzhU/FVny.exe
http://nmgclan.com/Ljeiekhn/NjTooe.exe
http://mkikiais.com/9BQB61u4/wBCK.exe
Targets
-
-
Target
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975N.exe
-
Size
121KB
-
MD5
5164edc2228da64d49fd29e84ad09920
-
SHA1
3dbc1cc2ed20373497483204218ca251e6e06c11
-
SHA256
79dfc951b816837a653ab3a1de07debdf5acb8234d9006931a98b38336f45975
-
SHA512
9a414f3059ee12108d25034b8702173a6374651b582d42cacda6abbe926a8f99bbb120d050184afe2a7b990b23828225f43a3d78b2ac9365a67d53dc1ed4e185
-
SSDEEP
3072:KPqu3dVcnpLIIOjSA59oxwZuHTWZUYTbBjGyOBKoRLHTVXPJ:Kyu3dV+LQWA/oxAbZyycRXPJ
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-