General

  • Target

    6e85054eb38de61c8e4cb8000dd3e4543e1ec4310d471bed49736966564b6b47

  • Size

    91KB

  • MD5

    724a45c7ac1859bc8b2082eb49af8660

  • SHA1

    f246d2f37ff4a0c7d58226569181a3f2fd347be3

  • SHA256

    6e85054eb38de61c8e4cb8000dd3e4543e1ec4310d471bed49736966564b6b47

  • SHA512

    b7a9ee651d9175dffea40ba349a1d019cbe1ddb41881aab4eca39f0ab9833f2f14a5c31fa7822f2496a807c0cab2bf9bff9679454c9c5963baabe74b2a7e09ed

  • SSDEEP

    1536:uvTGO5D8YS4qT/fKfNmLtWecKk0wrVhEDOPcrTvvkzbN/0:iKWD832mLUNx0HDOPdN/0

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://forum.xcpus.com:8080/ponyf/gate.php

http://pas.net/ponyf/gate.php

http://playonlinerummy.net/ponyf/gate.php

http://playrummyonlineguide.com/ponyf/gate.php

Attributes
  • payload_url

    http://www.acmestore.it/dUZRZM5W.exe

    http://www.butlerandconcierge.com/DW4s6.exe

    http://panachetechsolutions.com/njaKK.exe

Signatures

Files

  • 6e85054eb38de61c8e4cb8000dd3e4543e1ec4310d471bed49736966564b6b47
    .exe windows x86

    d6cd9cecc12ba283fd2bf86a18ca964e


    Headers

    Imports

    Sections