General
-
Target
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708N.exe
-
Size
114KB
-
Sample
250107-ma61gaymak
-
MD5
6f0a2e07660be674fb0e10a4f23305b0
-
SHA1
c791e828a00b00fcf851a1b03cca38c5050e059c
-
SHA256
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708
-
SHA512
9f62eeb3108da4a38bf5dcc16d4be1f8c322e0f3503f3c278a86303f2a0be982b11f9dc2ec72c32e96887914d6f1a7d7303540bde43f7aff9a644c0955465668
-
SSDEEP
3072:NVLAuRZ16QbRwgVgE7yDLeI7VKpwcnQyUBCoq:NBJV/72Ropwxfq
Static task
static1
Behavioral task
behavioral1
Sample
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://checkpoint-friendly-bag.com/ponyb/gate.php
http://checkpoint-friendly-bags.com/ponyb/gate.php
http://checkpoint-friendly-laptopcases.com/ponyb/gate.php
http://checkpoint-friendly-luggage.com/ponyb/gate.php
-
payload_url
http://ebaa.daa.jp/A8HFWqy.exe
http://fanpageserver.info/PhFJ.exe
http://hakata-ekimae.biz/YyJYqg.exe
http://www.twr.it/dW68EAqa.exe
Targets
-
-
Target
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708N.exe
-
Size
114KB
-
MD5
6f0a2e07660be674fb0e10a4f23305b0
-
SHA1
c791e828a00b00fcf851a1b03cca38c5050e059c
-
SHA256
f0866b060b22909577c781091929aead66233626b1fe43b7d267fda2d8fc9708
-
SHA512
9f62eeb3108da4a38bf5dcc16d4be1f8c322e0f3503f3c278a86303f2a0be982b11f9dc2ec72c32e96887914d6f1a7d7303540bde43f7aff9a644c0955465668
-
SSDEEP
3072:NVLAuRZ16QbRwgVgE7yDLeI7VKpwcnQyUBCoq:NBJV/72Ropwxfq
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-