MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b59427205b88d9cd8b38bf4c99f902d569085b708a9eb3c6c8b6d8a8ea7a361d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: b59427205b88d9cd8b38bf4c99f902d569085b708a9eb3c6c8b6d8a8ea7a361d
SHA3-384 hash: fc0826a641d1ff22f09839a19e0d55a3afba9263364e3cbe60c0ba4ebcf82894bd226203ed3e557326c82f8ae765205b
SHA1 hash: ccb0788634c7809cf787af2e855f5bb29d2a2534
MD5 hash: 2a4382cfda9b990027750d254ea17cc3
humanhash: triple-winter-comet-quebec
File name:Paket dokumentov konec iyulya.exe
Download: download sample
Signature Pony
File size:1'118'224 bytes
First seen:2020-07-21 10:46:40 UTC
Last seen:2020-07-21 11:44:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7b1ee636b23388a235e40871dd4aa161 (1 x Pony)
ssdeep 3072:3/bW/Yx00yuhUb+SI/ZlhfZYG1R+LZUebDldVY3IQa+bwRUiUSPBjEH:vau00yrqSI/Zfq2db7iUSy
Threatray 142 similar samples on MalwareBazaar
TLSH 8435D345A2B7CF29FD65B733966172211E2FFCE181A4398D25443B64ED3AA004F31BE6
Reporter abuse_ch
Tags:Downloader.Pony exe Pony


Avatar
abuse_ch
Malspam distributing Downloader.Pony:

HELO: smtp.ugramail.ru
Sending IP: 217.20.80.59
From: Жанна Шарапова <analitika@ugramail.ru>
Reply-To: Жанна Шарапова <tarasovaek65@rambler.ru>
Subject: =?utf-8?B?0JfQsNC60YDRi9Cy0LDRjtGJ0LjQtSDQtNC+0Lot0YLR?==?utf-8?B?iyAyMS4wNw==?=
Attachment: Paket dokumentov konec iyulya.001 (contains "Paket dokumentov konec iyulya.exe")

Pony C2:
http://139.180.165.173/p/z05857687.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
437
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Connection attempt to an infection source
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-07-21 10:48:08 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
rat spyware stealer family:pony discovery
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Runs ping.exe
Script User-Agent
Modifies system certificate store
Accesses cryptocurrency wallets, possible credential harvesting
Checks installed software on the system
Reads data files stored by FTP clients
Deletes itself
Reads user/profile data of web browsers
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

b5398425056a88da0725af533a94f05d

Pony

Executable exe b59427205b88d9cd8b38bf4c99f902d569085b708a9eb3c6c8b6d8a8ea7a361d

(this sample)

  
Dropped by
MD5 b5398425056a88da0725af533a94f05d
  
Delivery method
Distributed via e-mail attachment

Comments