General
-
Target
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186.exe
-
Size
34KB
-
Sample
250120-e39m3a1mdt
-
MD5
758207dc7de0122f89aae318131a422d
-
SHA1
b1500da4b8494f1b50784594545ec0295bb30e95
-
SHA256
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186
-
SHA512
8aa436ceb624231688870ec06accbbe411d49d8b8d22770ad571fbffbdc1884e1c6e1358fea0944eb861bb5eabb8db339a5bdaa7f11ddcea4f5a866cc478b31e
-
SSDEEP
768:B1YZHVdLyeivbORWHNS5wMA1WIEk+lYyZsj/YDcHt2:s5LszObU/E9lYVYDb
Behavioral task
behavioral1
Sample
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://ck94345.tmweb.ru/nilly/nicholas/gate.php
-
payload_url
http://ck94345.tmweb.ru/nilly/nicholas.exe
Targets
-
-
Target
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186.exe
-
Size
34KB
-
MD5
758207dc7de0122f89aae318131a422d
-
SHA1
b1500da4b8494f1b50784594545ec0295bb30e95
-
SHA256
ca4bc3f5bca3badc7dd8914091cfc54912bdbe48c978fa3d981e5b0b51e6b186
-
SHA512
8aa436ceb624231688870ec06accbbe411d49d8b8d22770ad571fbffbdc1884e1c6e1358fea0944eb861bb5eabb8db339a5bdaa7f11ddcea4f5a866cc478b31e
-
SSDEEP
768:B1YZHVdLyeivbORWHNS5wMA1WIEk+lYyZsj/YDcHt2:s5LszObU/E9lYVYDb
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-