MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b55bc5be4e26953b510e035aaa1f821babf4f641e830a80e37fe8d6ba34fab29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Pony
Vendor detections: 6
| SHA256 hash: | b55bc5be4e26953b510e035aaa1f821babf4f641e830a80e37fe8d6ba34fab29 |
|---|---|
| SHA3-384 hash: | 9d8d8bc73d6d27affa6389f667adb909e1d524dc43c5b41bfcefcb0e36841fca9c1629bee47ee39b3283fb28199085ca |
| SHA1 hash: | 144822f2f3271a235c19817566dad690b17b134b |
| MD5 hash: | 671eab4f65e6b05993baa322ffd72597 |
| humanhash: | georgia-colorado-music-failed |
| File name: | Purchase Order_pdf.exe |
| Download: | download sample |
| Signature | Pony |
| File size: | 633'856 bytes |
| First seen: | 2020-06-16 05:43:56 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 54460d2eedb6a541ae3fa68cd3e66377 (10 x Loki, 8 x AgentTesla, 4 x NanoCore) |
| ssdeep | 12288:8n5WrxQ9hwM0cqsdxGAukR6E2F6Be8nAOXDpyY1Jx:mQrx8h9Osdgk72wJ/4Y1H |
| Threatray | 127 similar samples on MalwareBazaar |
| TLSH | F5D49F22E2D04437C1E7363D9F4B9674AC2BBA132D286D466FE4CD0C9F396823967197 |
| Reporter | |
| Tags: | exe Pony |
abuse_ch
Malspam distributing Pony:HELO: slot0.mcleeria.com
Sending IP: 45.95.169.81
From: WEBB-STILES COMPANY <info@mcleeria.com>
Subject: NEW PO 0111146 PUR-1533
Attachment: Purchase Order_pdf.exe
Pony C2:
http://shinhan-vina.com.vn/hd/panelnew/gate.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Fareit
Gathering data
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-16 05:45:08 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
pony
Similar samples:
+ 117 additional samples on MalwareBazaar
Result
Malware family:
pony
Score:
10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.