General

  • Target

    ac3b526a325d3ece20eabcaadbfadae62977f6afa8b40f3ac83bff371a4e287b

  • Size

    34KB

  • MD5

    efe888af013f09d76f0c43d73ab3f0e9

  • SHA1

    e0a7793b244eb1af732933a035c4150c94eac43a

  • SHA256

    ac3b526a325d3ece20eabcaadbfadae62977f6afa8b40f3ac83bff371a4e287b

  • SHA512

    62f3f81d667b302f0686ecbee3b70a0f7094d8c9269ccbb1bc3e224d2b6533505bac9a5db021524a380c610d530983370fccec5ae7680874cffc8e17549b93f8

  • SSDEEP

    768:Ncm2wdRawt9YCqObgarB8ZU7XsSeuVeeP7Gi0S/+neKC9zaf+h5cnPQyf:48awt9hgaN/xVwflCtxhSQyf

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://itzh4cked.byethost32.com/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • ac3b526a325d3ece20eabcaadbfadae62977f6afa8b40f3ac83bff371a4e287b
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections