General

  • Target

    deac02256ff37a77b05f4defc0f4ad5e747eeaa5117c1b4f18eb539e0a44c99e

  • Size

    34KB

  • MD5

    f4e56e600c753664b67ca81357d884de

  • SHA1

    056f4b02f7f88f46e47ab28803f1406d5166cd92

  • SHA256

    deac02256ff37a77b05f4defc0f4ad5e747eeaa5117c1b4f18eb539e0a44c99e

  • SHA512

    78518db95d816d8cbb0c3f1c30b23adc9eb7238a342648bce5dc5240a73e04dab044a1202c4a690595c56ec33affc95b7e53df607c4fffc3a12b53054a66f274

  • SSDEEP

    768:CS2okzcm/rY5i8sW3S+py7JyWM3N7N7KwXi0ytJQoarV:CSkzcc8sWC+py7JU3vaP

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://ahmed1337.in/Panel/gate.php

Attributes
  • payload_url

    http://ahmed1337.in/Panel/shit.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • deac02256ff37a77b05f4defc0f4ad5e747eeaa5117c1b4f18eb539e0a44c99e
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections