MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40bcf1b92cac08e72eb025659bb892a41926ebd655f448ff5544ece312986987. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 40bcf1b92cac08e72eb025659bb892a41926ebd655f448ff5544ece312986987
SHA3-384 hash: f67490136984c026edfdadda2b7bf9ae547872f57b38f1f68620281c630051a9d45c83078c5e7bfe995f42764795869f
SHA1 hash: f3a49453d50a99c1afe1f7b99dd943299d990407
MD5 hash: 333c5d42046282f33ac24bc0a23df993
humanhash: tennessee-snake-berlin-lion
File name:Bank Details_pdf.exe
Download: download sample
Signature Pony
File size:600'064 bytes
First seen:2020-06-11 11:14:14 UTC
Last seen:2020-06-11 14:21:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 42600c73f24e6ee7a1b79ca9986ca1f9 (7 x AgentTesla, 1 x HawkEye, 1 x Loki)
ssdeep 12288:/tS93c5kGW9FubPRH+Bgzi/zWH6kTEeSW5WOE:EFiWaDRH+Br/zWaleSW5WOE
Threatray 133 similar samples on MalwareBazaar
TLSH D0D49F62F2B158F7C153267D9C1B567CA8FABE51291C25462BF4CC4CBF28791392E183
Reporter abuse_ch
Tags:Downloader.Pony exe Pony


Avatar
abuse_ch
Malspam distributing Downloader.Pony:

HELO: staging.maykenbel.com
Sending IP: 195.12.49.182
From: Rafał Gąsior <rafal.gasior@astoria.pl>
Reply-To: Rafał Gąsior <rafal.gasior@astoria-pl.com>
Subject: RE: URGENT-Confirm Account Details/SOA Feb-May
Attachment: Bank Details_pdf.gz (contains "Bank Details_pdf.exe")

Pony C2:
http://shinhan-vina.com.vn/hh/panelnew/gate.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-06-11 11:16:10 UTC
File Type:
PE (Exe)
Extracted files:
228
AV detection:
29 of 31 (93.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:pony discovery rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Pony

Executable exe 40bcf1b92cac08e72eb025659bb892a41926ebd655f448ff5544ece312986987

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments