General

  • Target

    774d86aea5e2aa6b652697510ee798395964296eafa3d3ee0215ffe69bb7f3a4

  • Size

    34KB

  • MD5

    1508703d92373f44afad2d5c4084fc1f

  • SHA1

    c347f52ddffbaf4869a4480b0e34fa51a81b2b4c

  • SHA256

    774d86aea5e2aa6b652697510ee798395964296eafa3d3ee0215ffe69bb7f3a4

  • SHA512

    d3e299969ec1e5d50ba226bc1a82ac27930c68e8b4c7d4944338abd717033e019fadced66f4d934d95882ed1695e91e0cdee434b18c416d2b05c42e0341fcd98

  • SSDEEP

    768:2PGN9w0t96/abiHpWUa1FTOJI2Kn3PZWSb3YqMuJ+3Wkwtei:VM0t9IabiHpa1FTOO2K/ZXb3ZMuRkwtl

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://kcci.net.in/wp-admin/udo/gate.php

Attributes
  • payload_url

    http://obiwon.net/pony/obi.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 774d86aea5e2aa6b652697510ee798395964296eafa3d3ee0215ffe69bb7f3a4
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections