General
-
Target
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f.exe
-
Size
116KB
-
Sample
250105-cnh6fszndn
-
MD5
683367d4fcf71713f6a0b01ff1777180
-
SHA1
5db25707a12ae21289e56592f5831e1fc5938142
-
SHA256
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f
-
SHA512
f0bb5d0f4c67b0abc4e05d89706e5a8ae1d41fcceca10a529a8998eecddaa98c2b7bc00f52b08c9fb891a88bdf0e598179f8dd9e80a00acb1b98d60215d57c52
-
SSDEEP
3072:yPvZC1RGnktWXQ2vwJEbBW8ywPjgnIv1jhrr7xx:d14ne8fvTbQ8y01tr
Static task
static1
Behavioral task
behavioral1
Sample
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://watertreecapital.com/ponyz/gate.php
http://attentivetodetails.com/ponyz/gate.php
http://furnishedfloorplans.com/ponyz/gate.php
http://helisovertidewater.com/ponyz/gate.php
-
payload_url
http://www.acmestore.it/L4cWn.exe
http://server.autobeschriftung.at/nEjcrEA.exe
http://test.iboitalia.org/C7oaNwB.exe
Targets
-
-
Target
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f.exe
-
Size
116KB
-
MD5
683367d4fcf71713f6a0b01ff1777180
-
SHA1
5db25707a12ae21289e56592f5831e1fc5938142
-
SHA256
4b0eec704f0dcaac716cb941891cbf0fe66201cb454a28c889c853208c80461f
-
SHA512
f0bb5d0f4c67b0abc4e05d89706e5a8ae1d41fcceca10a529a8998eecddaa98c2b7bc00f52b08c9fb891a88bdf0e598179f8dd9e80a00acb1b98d60215d57c52
-
SSDEEP
3072:yPvZC1RGnktWXQ2vwJEbBW8ywPjgnIv1jhrr7xx:d14ne8fvTbQ8y01tr
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-