General
-
Target
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e
-
Size
1.1MB
-
Sample
250102-x5vwssvrhj
-
MD5
30762bc0bac86d51441b9005480ec6d1
-
SHA1
3dec859609eaca942fc3deaaf1579cc2f1e489b5
-
SHA256
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e
-
SHA512
12f46ef896e63ccccfbc31b45c983bbe6d4a66a0f048d4a23241a163f76dd5a898cb792abb22faee420a51b8c511006995b9bdc4ea33a3a9f7e10497312c3062
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYa:Eu0c++OCvkGsEGcjr1i6skHUYa
Static task
static1
Behavioral task
behavioral1
Sample
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e
-
Size
1.1MB
-
MD5
30762bc0bac86d51441b9005480ec6d1
-
SHA1
3dec859609eaca942fc3deaaf1579cc2f1e489b5
-
SHA256
596cced1b39cd88970e6dfa02396d05c391214a1d475e90138a1dc940849ef2e
-
SHA512
12f46ef896e63ccccfbc31b45c983bbe6d4a66a0f048d4a23241a163f76dd5a898cb792abb22faee420a51b8c511006995b9bdc4ea33a3a9f7e10497312c3062
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYa:Eu0c++OCvkGsEGcjr1i6skHUYa
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-