MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 074be99cbe3fff4403a53f8ed02772349f764146134c4ab349e1f982e6134cf2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 074be99cbe3fff4403a53f8ed02772349f764146134c4ab349e1f982e6134cf2
SHA3-384 hash: ca79bc97df22ae6315b2cdc2c1738dcf34710a9fe6f64b71fbffd7684a95951ff4d3ddc81423db5975386617a72be62d
SHA1 hash: 048d44fa17d1d54467413c450dc49e84553e378c
MD5 hash: 10e980a676b7ddd8c8aebbab387c8641
humanhash: alaska-oranges-fix-neptune
File name:074be99cbe3fff4403a53f8ed02772349f764146134c4ab349e1f982e6134cf2
Download: download sample
Signature Pony
File size:189'771 bytes
First seen:2020-11-15 22:41:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2727f1bbd099fb2b359b7df625ad4dd0 (8 x Pony)
ssdeep 3072:57uM5VEFom+c42X0niiPXPdYj8am/oh5eU5QQlVrI9l4DbHSrwHlm/2z4:NcoR52X0nTYj8aBhwPo2aDbHqoFz4
TLSH D2045B3AF1529037DB0894F414C91ACA0E44CF786A528797BE5EBA7D6CE101DAC47EF2
Reporter seifreed
Tags:Pony

Intelligence


File Origin
# of uploads :
1
# of downloads :
440
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Reading critical registry keys
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-11-15 22:42:21 UTC
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments