General

  • Target

    00ba75c7cec4b6fb43af1959c9975879c8dcd6f119d0ea808f7c60a90c3d99cf

  • Size

    34KB

  • MD5

    9ce3d27636f67454a2c773cd82aee418

  • SHA1

    8cfbbe06af59a126955b4318e31ca200479ab4a4

  • SHA256

    00ba75c7cec4b6fb43af1959c9975879c8dcd6f119d0ea808f7c60a90c3d99cf

  • SHA512

    e71b2d834cb6f904c6f1c0d3d687c3db46731ab33ecbfed1083fd89e2e7572bd7aef04934b0bb7a47059f34d796deb7ea4d49e22eef7d67297ad790fd6b04908

  • SSDEEP

    768:yAXKrfMYOR6I5THTdtwz8I2acBzriINvXT13qR:yA2MhR64THxtwzFMBznvQ

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://www.shumakadeenm.biz/bonks/Panel/gate.php

Attributes
  • payload_url

    http://www.shumakadeenm.biz/bonks/Panel/mark.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 00ba75c7cec4b6fb43af1959c9975879c8dcd6f119d0ea808f7c60a90c3d99cf
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections