General
-
Target
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d.exe
-
Size
71KB
-
Sample
250108-gtht4axlgt
-
MD5
d9e685ae58aedbf56003ed09ce5c87b8
-
SHA1
c8518a33d864da4f4e1d831a21e4ccc5623f083e
-
SHA256
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d
-
SHA512
2fc0439cb6061e50bd8cb3640b9b8cba02ea8cf515f14549f9b202c18d958281f95380552d70bcd1fc488ed8ad3432d971b4e182a76e30f8d41cc6d80fc66820
-
SSDEEP
768:ZxfKtnRBeUrjJvShpbT/C7jf4vc0Y+jn4CZCqYZczMrv0OyDRWBZ7J:HSnbG3oZ9qRC9b0CL
Static task
static1
Behavioral task
behavioral1
Sample
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://kaplq.ru/
http://ecrj.ru/
-
payload_url
http://ecrj.ru/f/sc.exe
http://ecrj.ru/f/pkc.exe
http://ecrj.ru/f/skc.exe
Targets
-
-
Target
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d.exe
-
Size
71KB
-
MD5
d9e685ae58aedbf56003ed09ce5c87b8
-
SHA1
c8518a33d864da4f4e1d831a21e4ccc5623f083e
-
SHA256
fbd7342089c98f931f0c55172a4023e335c1026755d9c863ea1b4aacfa21186d
-
SHA512
2fc0439cb6061e50bd8cb3640b9b8cba02ea8cf515f14549f9b202c18d958281f95380552d70bcd1fc488ed8ad3432d971b4e182a76e30f8d41cc6d80fc66820
-
SSDEEP
768:ZxfKtnRBeUrjJvShpbT/C7jf4vc0Y+jn4CZCqYZczMrv0OyDRWBZ7J:HSnbG3oZ9qRC9b0CL
-
Pony family
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-