General
-
Target
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5.exe
-
Size
1.1MB
-
Sample
250112-z6psaasler
-
MD5
2e2d14b4fd68ed78d0ad35540dda9c01
-
SHA1
5d67476b2b03e7a4cdafe2afb006b08e7cc4b3f2
-
SHA256
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5
-
SHA512
17908c977086055be6ce4a363aedb2611ffb35b6a5000512989c769edc34f632180c745e28e97b86547614376fe9994a79d4317f3e19b915de5b9c9a8a3bf9d5
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYo:Eu0c++OCvkGsEGcjr1i6skHUYo
Static task
static1
Behavioral task
behavioral1
Sample
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5.exe
-
Size
1.1MB
-
MD5
2e2d14b4fd68ed78d0ad35540dda9c01
-
SHA1
5d67476b2b03e7a4cdafe2afb006b08e7cc4b3f2
-
SHA256
578ec29353250a1cbb74f50860a078c959fe997aa89a37bb59fcd9c88cedb3e5
-
SHA512
17908c977086055be6ce4a363aedb2611ffb35b6a5000512989c769edc34f632180c745e28e97b86547614376fe9994a79d4317f3e19b915de5b9c9a8a3bf9d5
-
SSDEEP
24576:iu6J33O0c+JY5UZ+XC0kGsoTGcjr1I1lOq6sb8hTH7NWYo:Eu0c++OCvkGsEGcjr1i6skHUYo
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-