General

  • Target

    a4f9ad7c8867b67c8df8bdc63c0169c472d73768390e508f058b31f1e3e1835d

  • Size

    34KB

  • MD5

    eaf5d5884a99f18e950e7a6f531c6697

  • SHA1

    1242b6059f9100c9525a1c32a8bba0c0aa86b359

  • SHA256

    a4f9ad7c8867b67c8df8bdc63c0169c472d73768390e508f058b31f1e3e1835d

  • SHA512

    344037ca3c0db0ec7bf2235d219ac1d8b27cbe442026d82dbb9965f8374d06ace5524fbf3a6cf5afeccffdf7a44b7fbe41f4e93ec0cd4a4bc4be06fed798e107

  • SSDEEP

    768:wAbrSsK4ruLn5ArcbsrpmfvbtMi9BnVswFMqxKT6w9P9bvtEQ:Yst+ircgr4Rf9bXF3gf9r6Q

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://utopyamt2.com/shop/pages/Panel/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a4f9ad7c8867b67c8df8bdc63c0169c472d73768390e508f058b31f1e3e1835d
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections