General

  • Target

    1096-64-0x0000000000400000-0x0000000000422000-memory.dmp

  • Size

    136KB

  • MD5

    f13c04431541dde883ee8e15ac5e9ba6

  • SHA1

    37854fd532e42dd41d7a761dbbc13fd7623d16ea

  • SHA256

    1d5c3e8cd096032a4dc9c671f4878b9a82eea6c52256ca5a90de4c229ca2d3db

  • SHA512

    60e5dfe810d342905315d0aa8baf3d7ce0cb633eb3b1cfa9cded52adac5ea61f91fed46b3363edf3529d663eb1ae8e20cea08334b40ff18dc270447b9ab77e5e

  • SSDEEP

    1536:CeEKZFCEqTxpehsIACeeXbn1tDv37P6vmb0gCZy5OVMu3TvVkzbkvql/r:5LTCgstsn1VDCvyOVLKWql/r

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://www.diacom.ro/echinox/cgi-bln/return/gate.php

Signatures

Files

  • 1096-64-0x0000000000400000-0x0000000000422000-memory.dmp
    .exe windows x86


    Headers

    Sections