General

  • Target

    e1c52f798f7aa46da951e77f5c5e335356e649b59a6556340772a91570037c26

  • Size

    34KB

  • MD5

    93c71379175a6da4970b01adc3d05ff2

  • SHA1

    0f4c8032c925d8819ce9908ede6b594b3d8def37

  • SHA256

    e1c52f798f7aa46da951e77f5c5e335356e649b59a6556340772a91570037c26

  • SHA512

    da71f494dad27b2f3aa9f275a2392af855a022fcb63a4973ac303f8eca5083a870d206edebc8677f2b344fcf48306c4d63add3ac0df72411b3fd4c521cadfea3

  • SSDEEP

    768:IOtGu5gurpPZyb12jMb+sN5WiEtEKY3Ci3TcXsPD1kxKGaIyY:tEAgurpRyuMasWigv0TcXseKFY

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://hourofmomentoluwa.tk/fada/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e1c52f798f7aa46da951e77f5c5e335356e649b59a6556340772a91570037c26
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections