MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 92c2328cddcc51230e0dfcfd2b819b6778d73328770a941aed80aab9542a465d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 92c2328cddcc51230e0dfcfd2b819b6778d73328770a941aed80aab9542a465d
SHA3-384 hash: 9cedf9d27316659811a568881067ae273347de2bd9bc972b45fd0da7b0b4c9ad1997513026ba9a8c9392a64df7965f72
SHA1 hash: 4390f384196f0c049ea2ec0b948d9442e81ac116
MD5 hash: 182f2b240133463be8a9c4bd40624e2b
humanhash: mississippi-glucose-five-bulldog
File name:92c2328cddcc51230e0dfcfd2b819b6778d73328770a941aed80aab9542a465d
Download: download sample
Signature Pony
File size:189'771 bytes
First seen:2020-11-12 14:05:24 UTC
Last seen:2024-07-24 19:07:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2727f1bbd099fb2b359b7df625ad4dd0 (8 x Pony)
ssdeep 3072:p9+n5VEFom+cUALg+ikh9rhtZNDFV4B5eU5QQlVrI9l4DbHSrwHlm/2z4:ucoR5ALg+NtZNDgBwPo2aDbHqoFz4
TLSH 9E044B3AF1529037DB0894F414C91ACA0E44CF786A528797BE5EBA7D6CE101DAC47EF2
Reporter seifreed
Tags:Pony

Intelligence


File Origin
# of uploads :
2
# of downloads :
379
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Reading critical registry keys
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Brute forcing passwords of local accounts
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-11-12 14:06:56 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments