General

  • Target

    a67de751f8e0a36748fe51977e71d104061f3142f5a40d94a1f6a1f2ccffe65c

  • Size

    34KB

  • MD5

    96e7f7933b62b531206ffe61387c6130

  • SHA1

    44a64ee7d6131dc3fbc5d6cd7cae35bfd1d92a74

  • SHA256

    a67de751f8e0a36748fe51977e71d104061f3142f5a40d94a1f6a1f2ccffe65c

  • SHA512

    173a73e305c1510a519225da4dea9af75a46d86f817c08139187c106ba7ad1cd61d5b6b7d34081a01527773225fdcc639546357774c6809103260dfedad223d3

  • SSDEEP

    768:g+vFrFupk73azZZtl6qP6TE90mP01q8GA+7sZ0VaoFq+3tWQicLK:FvREpk7+Z56qP6TY0mP0ID7sZaaVmtWN

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://deconsult.ruskyhosting.ru/ify/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a67de751f8e0a36748fe51977e71d104061f3142f5a40d94a1f6a1f2ccffe65c
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections