General
-
Target
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5.exe
-
Size
125KB
-
Sample
250109-amz2gaslfr
-
MD5
ae05ed4c37e7b646c69b963cb3699c1c
-
SHA1
edd68d15014ba79e4a16fe60322a423e5fca2075
-
SHA256
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5
-
SHA512
6ade9452c44badff20a09e23d279b577ce9dfd62649fc6b9cca00580bef8281d61e23b88d038e4bc01fac198d8ba4bd316c17e2edf80fb3a900f0a4da44608d5
-
SSDEEP
3072:GaPjRdi6wpXgnSWc5ekQj5uOSpzkUVN/u3l3lG/:HbPt1c5eN5uBzlz/u3+
Static task
static1
Behavioral task
behavioral1
Sample
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://ammsindianapolis.com/forum/viewtopic.php
http://ammsjacksonville.com/forum/viewtopic.php
http://ammslosangeles.com/forum/viewtopic.php
http://ammsmiami.com/forum/viewtopic.php
-
payload_url
http://dlacton.com/fM5.exe
http://topseoseobestpractices.com/mbTcd.exe
http://staffsicurezza.com/5y4qy0fd.exe
Targets
-
-
Target
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5.exe
-
Size
125KB
-
MD5
ae05ed4c37e7b646c69b963cb3699c1c
-
SHA1
edd68d15014ba79e4a16fe60322a423e5fca2075
-
SHA256
45ec99e84549ce37bcfe25ce1ec1ba0f4ade6c096a2fac0966997327108deea5
-
SHA512
6ade9452c44badff20a09e23d279b577ce9dfd62649fc6b9cca00580bef8281d61e23b88d038e4bc01fac198d8ba4bd316c17e2edf80fb3a900f0a4da44608d5
-
SSDEEP
3072:GaPjRdi6wpXgnSWc5ekQj5uOSpzkUVN/u3l3lG/:HbPt1c5eN5uBzlz/u3+
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-