MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68629701b12d1300254ce04807b894fd8195bd36ce6b6ceebe5beba5d60cf5d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 68629701b12d1300254ce04807b894fd8195bd36ce6b6ceebe5beba5d60cf5d3
SHA3-384 hash: e4f146eab287a6f976be7171b7daa2e1fb268ff2d696e1030a6d1ddbe9a0db4af525a292d1eb59a6d63e5efca91f5ae6
SHA1 hash: 7a28b40270b5722de41a0123da7e26f171da5f5c
MD5 hash: b58c2b723bad091caf084ac06049b8ad
humanhash: beer-blossom-red-grey
File name:68629701b12d1300254ce04807b894fd8195bd36ce6b6ceebe5beba5d60cf5d3
Download: download sample
Signature Pony
File size:139'776 bytes
First seen:2020-11-11 11:03:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash be19e18d6a8b41631d40059031a928bb (28 x Pony, 3 x Loki, 3 x NetWire)
ssdeep 3072:MoTv/p/6pTho4yEPhXzpqq/c+tPtdHVWcr:BTn4o4yKzb/ztV
Threatray 408 similar samples on MalwareBazaar
TLSH 06D3226920CC046CD54ED83158E69EE2F36FADC0882D197B1FE2FF277A76A0A1471935
Reporter seifreed
Tags:Pony

Intelligence


File Origin
# of uploads :
1
# of downloads :
375
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Reading critical registry keys
DNS request
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-11-11 11:05:23 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
68629701b12d1300254ce04807b894fd8195bd36ce6b6ceebe5beba5d60cf5d3
MD5 hash:
b58c2b723bad091caf084ac06049b8ad
SHA1 hash:
7a28b40270b5722de41a0123da7e26f171da5f5c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments