General

  • Target

    4f78a0abed54ab8f6d788dbb05f7a3880e915b0b9e9f9d67991c2e059b4ea716

  • Size

    34KB

  • MD5

    7b5d069fdcf7d09a82bd3384617b4acc

  • SHA1

    4f10cc8bb89b6a7ccd801b9cecc713cbf1766b3c

  • SHA256

    4f78a0abed54ab8f6d788dbb05f7a3880e915b0b9e9f9d67991c2e059b4ea716

  • SHA512

    d1b27c809de34d12df4b9cde2b5e60cfe86a64391b7c1b66789d88b4c12ef4b905e9744ec9234d485307493627656231a9ea1f2d774c861c411ac76f451a77ed

  • SSDEEP

    768:pIP/W/dRkmIUYuPfOGiFX+g88rDUW5XcJjv7NAVM7Qfbz:pDkmIUYuPfYFugWW5MNze3

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://basilicd.com/roger/Panel/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4f78a0abed54ab8f6d788dbb05f7a3880e915b0b9e9f9d67991c2e059b4ea716
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections