General

  • Target

    b3e2a41ad3e6e562e90f1eaf8f92e49f363ef72a72d5469f7882d2015b8ed817

  • Size

    34KB

  • MD5

    877ca33e61f8c220fa695904527e8748

  • SHA1

    ef821f0c212e4cf98d23b6883f536cba220fce85

  • SHA256

    b3e2a41ad3e6e562e90f1eaf8f92e49f363ef72a72d5469f7882d2015b8ed817

  • SHA512

    0bc23c2b98b75cb877a250940c6e60da5d81cc4af683fd3a2675e42f42cc612c9ba3aa593a0f072e0e2e0b342b8281ed4dfb683cea31f9fb21bf40fa154a748f

  • SSDEEP

    768:RlXP/dRil/97GgdimERNv5ogXJLR3Qtl9z+r0CZ7/bUfj:nDC/9LdBERb5LRAtll+r0C1/6j

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://185.24.234.118/pony/secure.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b3e2a41ad3e6e562e90f1eaf8f92e49f363ef72a72d5469f7882d2015b8ed817
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections