MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 200ea893543df1ab909c78ed95c3f56b1693b283a6b210bc9d8f0694faab1168. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 200ea893543df1ab909c78ed95c3f56b1693b283a6b210bc9d8f0694faab1168
SHA3-384 hash: 953dccc6c8aa01f6f6cc952139456bb63584018073d10edbfa642452546d814fdf53b4d03045f81340c61f0afabf99fc
SHA1 hash: 9dd3eedc0fd859171f19112cdf9e37fa910b0b7e
MD5 hash: 97fe3364b2b8650abc296568d1a47112
humanhash: chicken-fruit-aspen-oscar
File name:200ea893543df1ab909c78ed95c3f56b1693b283a6b210bc9d8f0694faab1168
Download: download sample
Signature Pony
File size:189'771 bytes
First seen:2020-11-15 22:41:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2727f1bbd099fb2b359b7df625ad4dd0 (8 x Pony)
ssdeep 3072:37MX5VEFom+cFpNgcinTzn8iVKRTV0K5eU5QQlVrI9l4DbHSrwHlm/2z2:0coRgpNgc/iVKRKKwPo2aDbHqoFz2
TLSH 02044B3AF1529037DB0894F414C91ACA0E44CF786A528797BE5EBA7D6CE101DAC47EF2
Reporter seifreed
Tags:Pony

Intelligence


File Origin
# of uploads :
1
# of downloads :
441
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Reading critical registry keys
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-11-15 22:41:41 UTC
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments