General

  • Target

    bdc8f183fb9a232a87f175d1bf2c6b44aa79cd4b9c2bad0203af65fde7caebf6

  • Size

    34KB

  • MD5

    52c160a62d49188a8c28bdbc374f3cfb

  • SHA1

    8a91a7ec4aa68961bab1c6eb729ed20037d8845d

  • SHA256

    bdc8f183fb9a232a87f175d1bf2c6b44aa79cd4b9c2bad0203af65fde7caebf6

  • SHA512

    2d9ec3db62ddcb08ab0ddf5417dc30a4d182a5ca468a57f074e38176231869e222b4c7f1b6e55fb0b3022e8247ccf4dd661392a43a76b5a84d65d6dea00cd98f

  • SSDEEP

    768:KPvVzkP6o/JIQlbszNkrtc7wQdmGIsZWrjf7nqx+:KPdzcFJyNEwwxGIKWrXns+

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://www.blingmeagift.com.au/pvt/logo/gate.php

Attributes
  • payload_url

    http://www.blingmeagift.com.au/pvt/logo/Pony.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • bdc8f183fb9a232a87f175d1bf2c6b44aa79cd4b9c2bad0203af65fde7caebf6
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections