General
-
Target
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963N.exe
-
Size
104KB
-
Sample
241219-bx32js1rhj
-
MD5
d785f5d0a1e7252d50352e19d09e3de0
-
SHA1
3da6841d155f8b7ac134f5afdec13a017c9e73f2
-
SHA256
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963
-
SHA512
a4dcc48d8ca9578e67b18c34c4039f5002d317b0e9b593c5a9737f8bd8fd5247ce71aa21a2fe9e5b61d0f1579a94966f868c97498ac87bb9c89abe970ce25e06
-
SSDEEP
1536:D9TE/GGPs9kehtExX1uTK5NavsyxIAaVTZZtBQwJay8MClmQ0ErCW3:a/1s9nhODRavrIDVTTTEcumQ5rCW
Static task
static1
Behavioral task
behavioral1
Sample
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://115.47.49.181/0NK6XVdsm4L0/DFs2evNyFAhS.php
http://115.47.49.181/0NK6XV/doctorlhasa.php
Targets
-
-
Target
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963N.exe
-
Size
104KB
-
MD5
d785f5d0a1e7252d50352e19d09e3de0
-
SHA1
3da6841d155f8b7ac134f5afdec13a017c9e73f2
-
SHA256
ddac6ae5a04d2b0a3453efc882fcbb7772b16b400700c6ea71a24316cde92963
-
SHA512
a4dcc48d8ca9578e67b18c34c4039f5002d317b0e9b593c5a9737f8bd8fd5247ce71aa21a2fe9e5b61d0f1579a94966f868c97498ac87bb9c89abe970ce25e06
-
SSDEEP
1536:D9TE/GGPs9kehtExX1uTK5NavsyxIAaVTZZtBQwJay8MClmQ0ErCW3:a/1s9nhODRavrIDVTTTEcumQ5rCW
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-