General

  • Target

    1872-63-0x0000000000400000-0x00000000004D7000-memory.dmp

  • Size

    860KB

  • MD5

    eb8ff0fb845fce5b55e77bc9de0631dc

  • SHA1

    567ce699cf523fc61ee71a2e1eb3ed5b303cb744

  • SHA256

    8994d3afef6a8d810d891e42231b7fb1f5625c7ad6bfb1794052fca73e68f244

  • SHA512

    9ade3362a8d396ad0d83b18b400bbe1a4bc505f3d70a147d694f5a16259e6f62e046969e1e5d9b0f5b67b15127fde3fd0560fd2d1f793dfea036a522defca155

  • SSDEEP

    1536:EMoizM4UZqTCO69Mxe/ANGvRxp1xktOej1aXYDx5ULOb4hSvvQsNkzm+U6aJ:OSBUMSxp1aRjcOb4hMhh6c

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://sunelec-kk.com/tmp/r1.php

http://japmotors.net/tmp/r1.php

Attributes
  • payload_url

    http://globalofficesolution.net/tmp/file1.exe

    http://globalofficesolution.net/tmp/file2.exe

    http://davesclassics.com.au/tmp/file1.exe

    http://davesclassics.com.au/tmp/file2.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1872-63-0x0000000000400000-0x00000000004D7000-memory.dmp
    .exe windows x86


    Headers

    Sections