MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cf857e8a28a380c5e001013c6fd13a67f02782a84829801b12079048e8d86cf0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Pony
Vendor detections: 7
| SHA256 hash: | cf857e8a28a380c5e001013c6fd13a67f02782a84829801b12079048e8d86cf0 |
|---|---|
| SHA3-384 hash: | df1780cca05ef3e9be95c499d602c29514f11b0a02b8367471c145933c446ff3ecf69deaf50b1b9e3414b79daaec3e34 |
| SHA1 hash: | c94be04f35803b4ce866cf8233376852a76d9056 |
| MD5 hash: | 90f9eedffde8bf44ea403705dbcf7ba3 |
| humanhash: | kentucky-enemy-april-idaho |
| File name: | cf857e8a28a380c5e001013c6fd13a67f02782a84829801b12079048e8d86cf0 |
| Download: | download sample |
| Signature | Pony |
| File size: | 264'192 bytes |
| First seen: | 2020-11-12 14:25:20 UTC |
| Last seen: | 2024-07-24 21:35:11 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0a131a315228230104c175573ec8ff41 (4 x Pony, 2 x Formbook, 2 x AgentTesla) |
| ssdeep | 6144:Jag9XEMZlQF0Qv76E4/UBKZncsqBEPX3URILENafU1/VBK3UFKKA:Jagw007B4SuDqBEPX3URISafU1tBKm |
| Threatray | 138 similar samples on MalwareBazaar |
| TLSH | 964412A5F7F886B0CFAC347B56B38B79068AA627775B4F623A30EC4FBC501568010656 |
| Reporter | |
| Tags: | Pony |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Unpacked files
b01bb1b0f8138c7ce50860cd5218554d6b049d0862ec48a4e2076c6e6e309bed
cf857e8a28a380c5e001013c6fd13a67f02782a84829801b12079048e8d86cf0
76f96173c9f07ead9a330ac935b73f5f695933f7b014bd4b51c13695119f3cec
a8748c739e91e0be7301e29fdc33f6054a0db6f6b949dbedcc188b3dc97be92c
859936cf64b25cbf05d8d910b98ff8ebbb721649c9c01652787c27a38c8000d7
dfa87a6c76a74ba5bc6a291455a12ad1f7f70beeb3ae505dab167d7d6baef5b8
f055effd1f500e383d3d28270462d1930f7234d893d447ad47eed90dfdccabc4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | suspicious_packer_section |
|---|---|
| Author: | @j0sm1 |
| Description: | The packer/protector section names/keywords |
| Reference: | http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.