General
-
Target
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7N.exe
-
Size
91KB
-
Sample
250107-qzlbvatkht
-
MD5
79b37dfd1647645e316616d8698ab4f0
-
SHA1
0125421143b59b2db4b7ddedfc37f63a44701323
-
SHA256
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7
-
SHA512
3f0f23c3a0b9b0f6cf295e9d0dc1faf868c415a5909b44b3305a57d7efcd49546a17d542bbde96dc020b3a17b01402239e626c10d0e237e0848303c39bbee287
-
SSDEEP
1536:pLJqW7HNpQ4qTBl7Mf59CfLMvM352lmz2ROCcnTvHkzb//P:J8stG4CfYvE54ROC5//P
Behavioral task
behavioral1
Sample
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://TelevisionHunter.com/pizda/gate.php
-
payload_url
http://damp.pro/edZ4au.exe
http://parrocchiadiuopini.it/ZrktExKQ.exe
http://lobbyarkansas.com/q5CV.exe
Targets
-
-
Target
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7N.exe
-
Size
91KB
-
MD5
79b37dfd1647645e316616d8698ab4f0
-
SHA1
0125421143b59b2db4b7ddedfc37f63a44701323
-
SHA256
76c058ab6655d1e18586c7342c6b46bc9dca18758365e3e7f749025231ddb9f7
-
SHA512
3f0f23c3a0b9b0f6cf295e9d0dc1faf868c415a5909b44b3305a57d7efcd49546a17d542bbde96dc020b3a17b01402239e626c10d0e237e0848303c39bbee287
-
SSDEEP
1536:pLJqW7HNpQ4qTBl7Mf59CfLMvM352lmz2ROCcnTvHkzb//P:J8stG4CfYvE54ROC5//P
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-