MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 044ead01325ba352582421e78cce54811b6075e28486a8d1f4a9542da786f228. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 044ead01325ba352582421e78cce54811b6075e28486a8d1f4a9542da786f228
SHA3-384 hash: e4a30bd8bd6505de3c1571e6499472b7090c89955e81f309073033596f73ae3ad8de5962b9a8705808f89493962f4f3e
SHA1 hash: 4a1dc801a5f2bb0b71e5668dc0cce7e3cdac8b03
MD5 hash: e39ed02fe8b90dbcb8ca4e6d7c164554
humanhash: low-crazy-nebraska-three
File name:gunzipped
Download: download sample
Signature Pony
File size:807'936 bytes
First seen:2020-06-15 07:43:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 154500a06625191fc7a83b12527a2611 (2 x AgentTesla, 2 x Loki, 1 x HawkEye)
ssdeep 12288:CJ4tm5gnkBj0aY0JQvcX6mBnK0KdQNEyYXH9tze+olulMYL:T+gnMYaYmQvInKlU4XnzeYZL
Threatray 129 similar samples on MalwareBazaar
TLSH 04055A12E2B0FD36C1F6153B8D47F6789C2EBE10192879463BEFB848BE395817515B82
Reporter abuse_ch
Tags:Downloader.Pony Pony


Avatar
abuse_ch
Malspam distributing Downloader.Pony:

HELO: staging.maykenbel.com
Sending IP: 195.12.49.182
From: Rafał Gąsior <rafal.gasior@astoria.pl>
Reply-To: Rafał Gąsior <rafal.gasior@astoria-pl.com>
Subject: RE: URGENT-Confirm Account Details/SOA Feb-May
Attachment: Document Copy.gz (contains "gunzipped")

Pony C2:
http://shinhan-vina.com.vn/hh/panelnew/gate.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.CryptInjector
Status:
Malicious
First seen:
2020-06-15 07:45:05 UTC
AV detection:
29 of 31 (93.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Pony

Executable exe 044ead01325ba352582421e78cce54811b6075e28486a8d1f4a9542da786f228

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments