General
-
Target
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f
-
Size
1.1MB
-
Sample
250109-x3x85s1jar
-
MD5
f259c914676989356e6562575a4f30fd
-
SHA1
4284e94c5fa900f9ee43faeccba4dd04ab31e563
-
SHA256
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f
-
SHA512
5642069d65e67ce219d4dc01a0065fbb65c1b119e38f4eadb22f93fb60028546300c3d560929a4d329065fa9dc0ec3a0811a9f232e66e5575f21624c0dd466f1
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYL:Eu0c++OCvkGsEGcjr1i6skHUYL
Static task
static1
Behavioral task
behavioral1
Sample
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f
-
Size
1.1MB
-
MD5
f259c914676989356e6562575a4f30fd
-
SHA1
4284e94c5fa900f9ee43faeccba4dd04ab31e563
-
SHA256
ac79b08da1f933d16143a03183f32712304f53872c04d65843a8a52ababf207f
-
SHA512
5642069d65e67ce219d4dc01a0065fbb65c1b119e38f4eadb22f93fb60028546300c3d560929a4d329065fa9dc0ec3a0811a9f232e66e5575f21624c0dd466f1
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYL:Eu0c++OCvkGsEGcjr1i6skHUYL
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-