General

  • Target

    1984-62-0x0000000000400000-0x00000000004D7000-memory.dmp

  • Size

    860KB

  • MD5

    f42c729740150e14dcb78e0771f8260f

  • SHA1

    946c7fc809114f1f7a38ac97bbf4c76391be660c

  • SHA256

    80a8847c58ac50f33c8f8dc9af9a5e768311442ba705f0951e2365811a27903d

  • SHA512

    32b4b1010efd84e16566b831316532ff4bb2e0fb09e94ec7b892654674cd4feecdbaca623075023418bff358088c434a9f86caba07844decf527d1341d88e1a3

  • SSDEEP

    1536:EMoizM4UZqTCO69Mxe/ANGvRxp1xktOej1aXYDx5ULOb4hSvvQsNkzm06aJ:OSBUMSxp1aRjcOb4hMh06c

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://sunelec-kk.com/tmp/r1.php

http://japmotors.net/tmp/r1.php

Attributes
  • payload_url

    http://globalofficesolution.net/tmp/file1.exe

    http://globalofficesolution.net/tmp/file2.exe

    http://davesclassics.com.au/tmp/file1.exe

    http://davesclassics.com.au/tmp/file2.exe

Signatures

  • Pony family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1984-62-0x0000000000400000-0x00000000004D7000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections