General

  • Target

    636-59-0x0000000000400000-0x0000000000419000-memory.dmp

  • Size

    100KB

  • MD5

    2a81b879ec653cfca9cf2c3ef320187f

  • SHA1

    afba49e73c6bd1998e1d2249b7217782e9c930b3

  • SHA256

    6e3016fbea4b2ca1f614ae272cf59d0cd839529bfe15509bcafde3228997a963

  • SHA512

    9a5ef0b7ba2b942513cd9ffbd423c97f16b42e1628ac39e4d397154c806b612bf2603b9fbb33c9ab54775e7d67b2eb5977279baaa53ba4f99761fd72f02a881d

  • SSDEEP

    1536:FPfuIzAqTLjk0f1xNfsionNt2bPvsecu1Ob2tUTvHEKjkzZ5:Jf3Bx+TnPSOigEKM5

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://185.161.210.96/pass/jigaanti.php

Signatures

Files

  • 636-59-0x0000000000400000-0x0000000000419000-memory.dmp
    .exe windows x86


    Headers

    Sections