General

  • Target

    c76d7df1fff8ec77036d7044f6de738169d49af5ebedd6ad887e4e1cdd5f50f9

  • Size

    34KB

  • MD5

    c89c7ba29733f47c2bdee5460c26811d

  • SHA1

    6d0a5df26e09e3363e0b171e80bc6d20af3cf865

  • SHA256

    c76d7df1fff8ec77036d7044f6de738169d49af5ebedd6ad887e4e1cdd5f50f9

  • SHA512

    9c3303339e6de00200774fea69a54e2f1fa82c2071b0370b40174e2928ee6c5b4563e6ade84fc92ecc8cfecbf790388cb82e892d6e2843014482e35c50e778ff

  • SSDEEP

    768:Nm4cadRaEt90hQquH+27TU2KPoWzsKgTwX5jLAs6xS5Ue/l:WOaEt9NHOTP3sixL/O4

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://ahmed1337.in/phpgate/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c76d7df1fff8ec77036d7044f6de738169d49af5ebedd6ad887e4e1cdd5f50f9
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections