Behavioral task
behavioral1
Sample
1160-56-0x0000000000400000-0x0000000000421000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1160-56-0x0000000000400000-0x0000000000421000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1160-56-0x0000000000400000-0x0000000000421000-memory.dmp
-
Size
132KB
-
MD5
3f18c365609aa80b2e41cf44e5e293c8
-
SHA1
ab68de592013b05331a69561cae954921336c958
-
SHA256
82c5a25c26e89b854ede697a8f713be44ad26e0438e27afdbd5ef9859b69e7dc
-
SHA512
855e4e8ef13a0bd7130d1d8c7bb0b2c5467c0f6014bd39acbd436d4e8bef983a935d48a8abc1841194f5f2d748bbfab256e1017cdb630c269721eb65f09afd6c
-
SSDEEP
3072:tAgqhHNBVOuzdQV/syMU6OhOqsYWWZYWmwdaX82X45iAKMaEUSDslGz0:tAguBVOAO/syMU6O0VYLOM
Malware Config
Extracted
pony
http://wilcarobbe.com/zapoy/gate.php
http://littjohnwilhap.ru/zapoy/gate.php
http://ritsoperrol.ru/zapoy/gate.php
-
payload_url
http://one2shoppee.com/system/logs/xtool.exe
http://insta.reduct.ru/system/logs/xtool.exe
http://editprod.waterfilter.in.ua/system/logs/xtool.exe
Signatures
-
Pony family
Files
-
1160-56-0x0000000000400000-0x0000000000421000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ