General
-
Target
2008-57-0x0000000000400000-0x0000000000419000-memory.dmp
-
Size
100KB
-
Sample
230531-jpn7esea6s
-
MD5
c110bc496a3572b8eb24c3d284d42ed8
-
SHA1
662fdf0e8596b5803ac68e5226f43898a7e5c664
-
SHA256
f5a20c971ccbb4c9cf26cd33bda2d32e3ce7d05813b1b5542a57a6d9d9cfe38e
-
SHA512
20e791bd8108e57ee9a8a3083573d50615074b21c807d550b911426ab8ee78186c402c2dc0fb40b318020dbfbcde94832f40bd4c0fdcda1e271b299f7f49463b
-
SSDEEP
1536:5HeWbamqT+4lTHNadT9Fq+lRsJLnFj/AOhppWTvTEamkzmOuFRuFa:9eTMK4nc+lbOraEa2VCa
Behavioral task
behavioral1
Sample
2008-57-0x0000000000400000-0x0000000000419000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2008-57-0x0000000000400000-0x0000000000419000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
pony
http://185.79.156.18/bit/03/gate.php
Targets
-
-
Target
2008-57-0x0000000000400000-0x0000000000419000-memory.dmp
-
Size
100KB
-
MD5
c110bc496a3572b8eb24c3d284d42ed8
-
SHA1
662fdf0e8596b5803ac68e5226f43898a7e5c664
-
SHA256
f5a20c971ccbb4c9cf26cd33bda2d32e3ce7d05813b1b5542a57a6d9d9cfe38e
-
SHA512
20e791bd8108e57ee9a8a3083573d50615074b21c807d550b911426ab8ee78186c402c2dc0fb40b318020dbfbcde94832f40bd4c0fdcda1e271b299f7f49463b
-
SSDEEP
1536:5HeWbamqT+4lTHNadT9Fq+lRsJLnFj/AOhppWTvTEamkzmOuFRuFa:9eTMK4nc+lbOraEa2VCa
Score3/10 -