General
-
Target
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b
-
Size
1.1MB
-
Sample
250109-yew7lsype1
-
MD5
0fca1e877e7a21133f86b182fde023f3
-
SHA1
df07e5bd598e7c57ef1f20078fc0e8b8bb62e427
-
SHA256
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b
-
SHA512
0bb0b25de7a88f1698b9664e5da50a03c78b66d3f6380bd74bb5b903d8bbcd3f4ffcf3447503e30ea33cb3e46d2e60a31105719ff88d661b47527c071efb6c0a
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYk:Eu0c++OCvkGsEGcjr1i6skHUYk
Static task
static1
Behavioral task
behavioral1
Sample
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b
-
Size
1.1MB
-
MD5
0fca1e877e7a21133f86b182fde023f3
-
SHA1
df07e5bd598e7c57ef1f20078fc0e8b8bb62e427
-
SHA256
fa99d9d4df1153a716a93a7b721fbe6153dad6ffddf48c51a2c2f9c3d9a1339b
-
SHA512
0bb0b25de7a88f1698b9664e5da50a03c78b66d3f6380bd74bb5b903d8bbcd3f4ffcf3447503e30ea33cb3e46d2e60a31105719ff88d661b47527c071efb6c0a
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYk:Eu0c++OCvkGsEGcjr1i6skHUYk
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-