General

  • Target

    a91620b3443192ea276af6ea22a8b71a5483cae57687d7b6558549f252d9956a

  • Size

    34KB

  • MD5

    c602c3a6a7069b701db42279ea43be50

  • SHA1

    0077eb2bc0ff8d62b1c0b874ae85d4d2369f3b08

  • SHA256

    a91620b3443192ea276af6ea22a8b71a5483cae57687d7b6558549f252d9956a

  • SHA512

    0e677376060c2687558055d7b92cd7a76e8deeef4a5e4b0c2b0d8b18c12c5f7fef923fed7a35ce3f2ad12e989cdeaa60bc30c272b604bf278a37e56b299f16be

  • SSDEEP

    768:4N+1MsG/3hZ+R2/k64fKxf1pPQ+oKrkgdYgrPH25fWDR+gAf:3GT+R2/cWfTP3oKrkgprPH2g9JS

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://www.nedertormarint.com/hleb/gate.php

http://www.netropoton.com/redir/gate.php

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a91620b3443192ea276af6ea22a8b71a5483cae57687d7b6558549f252d9956a
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections