General
-
Target
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176
-
Size
131KB
-
Sample
250106-b9sfksvjcr
-
MD5
7ad71206dfc30d9a043a923abf7a7747
-
SHA1
13365e6f354405fe44e4a968e7820d90856b174f
-
SHA256
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176
-
SHA512
d156477715785f2f24b677a627db3424a67713e56d1b892994f170b3aa6c6dbbb214ea077a1d4350ac1b174c81dc1c0f9e472d5ff4f7ad486179cc316dd4999e
-
SSDEEP
3072:yadR8R4HkmB1qAfspLlI6rM7yCPccuLBK9xC9Awf+Qu:yadKR4HvB1qdvbrM7koxC5f+Q
Static task
static1
Behavioral task
behavioral1
Sample
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://50.116.49.51/ponys/gate.php
http://108.178.59.12/ponys/gate.php
-
payload_url
http://rentpaid.ca/5J0PySy2/Uzs4LGeo.exe
http://waxsurfers.com/KrYtpYBC/a0Y.exe
http://trongdanh.com.vn/gCYeq59G/sQMk.exe
Targets
-
-
Target
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176
-
Size
131KB
-
MD5
7ad71206dfc30d9a043a923abf7a7747
-
SHA1
13365e6f354405fe44e4a968e7820d90856b174f
-
SHA256
63522064905b11bd8166b560132f6c2b11acbf6d917b5598ea262e750f863176
-
SHA512
d156477715785f2f24b677a627db3424a67713e56d1b892994f170b3aa6c6dbbb214ea077a1d4350ac1b174c81dc1c0f9e472d5ff4f7ad486179cc316dd4999e
-
SSDEEP
3072:yadR8R4HkmB1qAfspLlI6rM7yCPccuLBK9xC9Awf+Qu:yadKR4HvB1qdvbrM7koxC5f+Q
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-