MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4bb2312117a9cca54bbb57f052f7a012d1971b1895fee03e35f6b657ac506bd1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4bb2312117a9cca54bbb57f052f7a012d1971b1895fee03e35f6b657ac506bd1
SHA3-384 hash: d7e9dfe8df9d25b3afbd62797ebdae1a1ad8ccbc65a13efa2d004145dc38894b1a57173f673a63f9369fb9dc3941f476
SHA1 hash: 3622dd3440994db547be7bd9009a09a237847b0a
MD5 hash: 24cd884ff4ea1f5693373c67dde0a1cf
humanhash: emma-equal-virginia-indigo
File name:Paket proverit'.exe
Download: download sample
Signature Pony
File size:127'040 bytes
First seen:2020-06-25 08:58:57 UTC
Last seen:2020-06-25 10:03:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c9866ddac9ca39687c438e54619da39 (1 x Pony)
ssdeep 3072:b7515/HclWYk7OznWmn4rvzwbFI+Sebifq:H51dHc07OznLnyvzwxtAC
Threatray 144 similar samples on MalwareBazaar
TLSH 58C315DC7AE4C936D06155B7AAA1C3B24B72ECF9163C921B31D426CF5A60BE5CC11B23
Reporter abuse_ch
Tags:exe geo Pony RUS


Avatar
abuse_ch
Malspam distributing Pony:

HELO: ir-tech.ru
Sending IP: 62.106.127.134
From: Евгения Копылова <deryabina@ir-tech.ru>
Reply-To: Евгения Копылова <tarasovaek51@rambler.ru>
Subject: Перечень проверить
Attachment: Paket proverit.001 (contains "Paket proverit'.exe")

Pony C2:
http://161.35.105.177/p/z05857687.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
433
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Creating a file
Creating a file in the %temp% directory
Reading critical registry keys
Running batch commands
Creating a process with a hidden window
Launching a process
Stealing user critical data
Sending an HTTP GET request to an infection source
Brute forcing passwords of local accounts
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
spyware discovery rat stealer family:pony
Behaviour
Script User-Agent
Runs ping.exe
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Checks for installed software on the system
Accesses cryptocurrency wallets, possible credential harvesting
Deletes itself
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Pony

Executable exe 4bb2312117a9cca54bbb57f052f7a012d1971b1895fee03e35f6b657ac506bd1

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments