MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2fdb9fa88fa2082583d32914c3863521604dd32218c26a0f35e0141ba35408b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Pony
Vendor detections: 11
| SHA256 hash: | 2fdb9fa88fa2082583d32914c3863521604dd32218c26a0f35e0141ba35408b7 |
|---|---|
| SHA3-384 hash: | d2d6fd87314e59799b76369266e7235b2793b5bdb76cd0cf5ee710405ebfed1122c99ae6c34e573921c3c1293d51664f |
| SHA1 hash: | 5b2e6e541ea6f47e369291396a5d91564ece2eb8 |
| MD5 hash: | fe7bc3cd6512f31d48a58caf3e558fee |
| humanhash: | seventeen-eighteen-india-montana |
| File name: | 2fdb9fa88fa2082583d32914c3863521604dd32218c26a0f35e0141ba35408b7.exe |
| Download: | download sample |
| Signature | Pony |
| File size: | 476'079 bytes |
| First seen: | 2021-04-26 15:07:04 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9c61e193ad83beb9c6707bb817822229 (5 x RedLineStealer, 1 x Pony, 1 x CoinMiner) |
| ssdeep | 12288:jpRN/nV+NnqIbQv6YMtTojf0hxZnLBEWYWGS0C89BzA:jpT/nV+NqIRhyLUuWYVSIc |
| Threatray | 241 similar samples on MalwareBazaar |
| TLSH | 1FA412323FE2C0F9C5920A715986376509BAF7361B29DEC79F901C039E64AD2C77C296 |
| Reporter | |
| Tags: | Pony Ransomware |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
2fdb9fa88fa2082583d32914c3863521604dd32218c26a0f35e0141ba35408b7
aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202
09421ff53504cf75091ab714967521b7d55f0975b2ca08d7887bf6fb000c1b82
ac2362bfb043929f138f0ed947f81fa8444fd87b2301ecaa9a837e86f6eca690
d7430680c994bc488209aa05c2e72de9ffe5d858111404a2ffb7715bae4f0758
5f0798cdb628b90fa0507427cfad23ac606c781d630526e15c20e0150a9ece04
afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e
1dffdc569c0107c0f2e102f0da4fb60ac3ad59c5697e822f68548e681a384ad9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | IPPort_combo_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
| Rule name: | Select_from_enumeration |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
| Rule name: | SharedStrings |
|---|---|
| Author: | Katie Kleemola |
| Description: | Internal names found in LURK0/CCTV0 samples |
| Rule name: | UAC_bypass_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | UAC bypass in files like avemaria |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [F0002.001] Collection::Application Hook
1) [F0002.002] Collection::Polling
2) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
3) [C0032.001] Data Micro-objective::CRC32::Checksum
4) [C0026.002] Data Micro-objective::XOR::Encode Data
6) [C0046] File System Micro-objective::Create Directory
7) [C0048] File System Micro-objective::Delete Directory
8) [C0047] File System Micro-objective::Delete File
9) [C0049] File System Micro-objective::Get File Attributes
10) [C0051] File System Micro-objective::Read File
11) [C0050] File System Micro-objective::Set File Attributes
12) [C0052] File System Micro-objective::Writes File
13) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
14) [C0017] Process Micro-objective::Create Process
15) [C0038] Process Micro-objective::Create Thread
16) [C0054] Process Micro-objective::Resume Thread
17) [C0018] Process Micro-objective::Terminate Process