MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Pony
Vendor detections: 10
| SHA256 hash: | aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202 |
|---|---|
| SHA3-384 hash: | 3d47433695b1421bd7dd6f5b782aca475af99e02b2e55cacd553c5b17321146222db748c8c3c404c0801357c7d49d161 |
| SHA1 hash: | 477dc12f213dd05a15b61207926b478d3a0d04c7 |
| MD5 hash: | fd442753c3895d868eed72f7854e2fba |
| humanhash: | beryllium-beer-blue-emma |
| File name: | AADDE71205336CCDD048F0B5029BECBBCD03E741045F4.exe |
| Download: | download sample |
| Signature | Pony |
| File size: | 455'338 bytes |
| First seen: | 2021-05-08 12:15:31 UTC |
| Last seen: | 2021-05-08 13:02:25 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1d1577d864d2da06952f7affd8635371 (10 x Gamaredon, 4 x UltraVNC, 3 x QuasarRAT) |
| ssdeep | 12288:ZAHiKgHgZ1mWryniKSojf0hxZnLBEWYWGS0C89BzI:ZACKRZEZn3xLUuWYVSI0 |
| Threatray | 257 similar samples on MalwareBazaar |
| TLSH | 8EA41222FBD285F6E096027149922BA982BDD6BD032DCCC35B984D459FA4DD6D33F207 |
| Reporter | |
| Tags: | exe Pony |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://oknoff52.ru/api/ | https://threatfox.abuse.ch/ioc/33203/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
2fdb9fa88fa2082583d32914c3863521604dd32218c26a0f35e0141ba35408b7
aadde71205336ccdd048f0b5029becbbcd03e741045f406b2fa819b909809202
09421ff53504cf75091ab714967521b7d55f0975b2ca08d7887bf6fb000c1b82
ac2362bfb043929f138f0ed947f81fa8444fd87b2301ecaa9a837e86f6eca690
d7430680c994bc488209aa05c2e72de9ffe5d858111404a2ffb7715bae4f0758
5f0798cdb628b90fa0507427cfad23ac606c781d630526e15c20e0150a9ece04
afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e
1dffdc569c0107c0f2e102f0da4fb60ac3ad59c5697e822f68548e681a384ad9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | IPPort_combo_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
| Rule name: | pony |
|---|---|
| Author: | Brian Wallace @botnet_hunter |
| Description: | Identify Pony |
| Rule name: | Select_from_enumeration |
|---|---|
| Author: | James_inthe_box |
| Description: | IP and port combo |
| Rule name: | SharedStrings |
|---|---|
| Author: | Katie Kleemola |
| Description: | Internal names found in LURK0/CCTV0 samples |
| Rule name: | suspicious_packer_section |
|---|---|
| Author: | @j0sm1 |
| Description: | The packer/protector section names/keywords |
| Reference: | http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/ |
| Rule name: | UAC_bypass_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | UAC bypass in files like avemaria |
| Rule name: | win_pony_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
| Rule name: | with_sqlite |
|---|---|
| Author: | Julian J. Gonzalez <info@seguridadparatodos.es> |
| Description: | Rule to detect the presence of SQLite data in raw image |
| Reference: | http://www.st2labs.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [F0002.001] Collection::Application Hook
1) [F0002.002] Collection::Polling
2) [C0032.001] Data Micro-objective::CRC32::Checksum
3) [C0026.002] Data Micro-objective::XOR::Encode Data
5) [C0046] File System Micro-objective::Create Directory
6) [C0048] File System Micro-objective::Delete Directory
7) [C0047] File System Micro-objective::Delete File
8) [C0049] File System Micro-objective::Get File Attributes
9) [C0051] File System Micro-objective::Read File
10) [C0050] File System Micro-objective::Set File Attributes
11) [C0052] File System Micro-objective::Writes File
12) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
13) [C0017] Process Micro-objective::Create Process
14) [C0038] Process Micro-objective::Create Thread
15) [C0054] Process Micro-objective::Resume Thread
16) [C0018] Process Micro-objective::Terminate Process