General
-
Target
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41.exe
-
Size
114KB
-
Sample
250106-1smlfa1pcq
-
MD5
2fd66204c8845902154625c9abef1245
-
SHA1
db000ce940b2396a1f98a7dc1b3db84a25737782
-
SHA256
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41
-
SHA512
c74c45ef005f5a0a3231717b22f228e9fc4ae5fbe6d2a0b8e94b95eec0e913f56851da5b1fffac97de6f886b32730d75b1a97f7cbc9e87fb0e7aeb2dab54bb7d
-
SSDEEP
3072:NVLAuRZ16QbRwgVgE7yDLeI7VKpwcnQyUBCoqM:NBJV/72RopwxfqM
Static task
static1
Behavioral task
behavioral1
Sample
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://checkpoint-friendly-bag.com/ponyb/gate.php
http://checkpoint-friendly-bags.com/ponyb/gate.php
http://checkpoint-friendly-laptopcases.com/ponyb/gate.php
http://checkpoint-friendly-luggage.com/ponyb/gate.php
-
payload_url
http://ebaa.daa.jp/A8HFWqy.exe
http://fanpageserver.info/PhFJ.exe
http://hakata-ekimae.biz/YyJYqg.exe
http://www.twr.it/dW68EAqa.exe
Targets
-
-
Target
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41.exe
-
Size
114KB
-
MD5
2fd66204c8845902154625c9abef1245
-
SHA1
db000ce940b2396a1f98a7dc1b3db84a25737782
-
SHA256
f8b2b49263ea0ced4e96db419e1ea80746df092e7545600a83ef75286d314e41
-
SHA512
c74c45ef005f5a0a3231717b22f228e9fc4ae5fbe6d2a0b8e94b95eec0e913f56851da5b1fffac97de6f886b32730d75b1a97f7cbc9e87fb0e7aeb2dab54bb7d
-
SSDEEP
3072:NVLAuRZ16QbRwgVgE7yDLeI7VKpwcnQyUBCoqM:NBJV/72RopwxfqM
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-