General
-
Target
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077
-
Size
1.1MB
-
Sample
250109-yb68ea1lej
-
MD5
3e6190cda705aa3f4e9ff4922a24f54d
-
SHA1
0bac538c0d5b109ccb51874fce067d43b9c26a52
-
SHA256
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077
-
SHA512
eebf4df29485c7385f3cb7a8a33f433908cbfdd80ca68e24574329237aeadbf00f5b3cd75993a2165bbf3beb4f129deb719850a0f6f3a33ac97930312e4f26dc
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYT:Eu0c++OCvkGsEGcjr1i6skHUYT
Static task
static1
Behavioral task
behavioral1
Sample
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077
-
Size
1.1MB
-
MD5
3e6190cda705aa3f4e9ff4922a24f54d
-
SHA1
0bac538c0d5b109ccb51874fce067d43b9c26a52
-
SHA256
8e4bab0c523b72d37016ab9fbac74bae001c42eeed68094428befb8bf7c70077
-
SHA512
eebf4df29485c7385f3cb7a8a33f433908cbfdd80ca68e24574329237aeadbf00f5b3cd75993a2165bbf3beb4f129deb719850a0f6f3a33ac97930312e4f26dc
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYT:Eu0c++OCvkGsEGcjr1i6skHUYT
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-