General

  • Target

    d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e

  • Size

    112KB

  • MD5

    78fcc87a19842758bed9edaa1f753ee0

  • SHA1

    2061da061cab968c14034d5c762c5eb8204dd85b

  • SHA256

    d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e

  • SHA512

    3fdfd63f2244ea10f779a79ebe6eae358e79049dbeaea6f4ea2418f5ccd8c5b32185c08fc5c3804208e0e1f0bd8e7a761c041ca3dbf88c26dacc98ba9012e383

  • SSDEEP

    1536:TKRcDtcoJqTTi3YUZ7ozn6uI61Os110mEkOZdkmtMTvHEKokzmt0E01Y:mRu3qdI6NO79QEKUt0ru

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://216.244.80.27/pony/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d2ac86304745bae602c585278c426ddd3762e09cd3f18ef0f54f24652c050b5e
    .exe windows x86


    Headers

    Sections