MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d67bc999b9c89a4c2ccd9832b42accf936e6b4403d27226c8de973ec0987d945. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Pony


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: d67bc999b9c89a4c2ccd9832b42accf936e6b4403d27226c8de973ec0987d945
SHA3-384 hash: d0d826f15e1d4b096de77bb63e2eee62dbe0a7c0c8536c3bed103dd3dcab43cd280ffd265c832c8a8fa2b1e423fc8ea9
SHA1 hash: 17624a2cb4a039d47b0e104c205f2f8d73a556f1
MD5 hash: c16015bfd2baf8f1a71aba165792b4e2
humanhash: harry-timing-kentucky-utah
File name:Schyot podpisat'.exe
Download: download sample
Signature Pony
File size:127'552 bytes
First seen:2020-06-25 09:21:24 UTC
Last seen:2020-06-25 10:03:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash abb67599a731a56f35aaae8416ba0959 (1 x Pony)
ssdeep 3072:FGQ5/HclWYk7OznWmnEMrvzwbFI+Sebifp:8QdHc07OznLnEWvzwxtAh
Threatray 144 similar samples on MalwareBazaar
TLSH 9EC315DC79E4C93BD06159FEEAA0C3A24732ED691630924B31D7260F5E63EE5C911B23
Reporter abuse_ch
Tags:Downloader.Pony exe Pony

Code Signing Certificate

Organisation:ATNIBMHOYLCQMQUFWF
Issuer:ATNIBMHOYLCQMQUFWF
Algorithm:sha1WithRSA
Valid from:Jun 21 20:45:48 2020 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: 1A3C55FCA2CE24A94229F3E98207E45A
Thumbprint Algorithm:
Thumbprint:
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
Malspam distributing Downloader.Pony:

HELO: mx1.fmbcfmba.ru
Sending IP: 195.9.132.194
From: Жанна Субботина <uermakova@fmbcfmba.ru>
Reply-To: Жанна Субботина <tarasovaek51@rambler.ru>
Subject: Счёт на 25.06
Attachment: Schyot podpisat.001 (contains "Schyot podpisat'.exe")

Pony C2:
http://161.35.105.177/p/z05857687.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
434
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Creating a file
Creating a file in the %temp% directory
Reading critical registry keys
Running batch commands
Creating a process with a hidden window
Launching a process
Stealing user critical data
Sending an HTTP GET request to an infection source
Brute forcing passwords of local accounts
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
spyware discovery rat stealer family:pony
Behaviour
Script User-Agent
Runs ping.exe
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Checks for installed software on the system
Accesses cryptocurrency wallets, possible credential harvesting
Deletes itself
Reads user/profile data of web browsers
Reads data files stored by FTP clients
Pony,Fareit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

eb8b51ca53f8c988a68e99039efd5f2d

Pony

Executable exe d67bc999b9c89a4c2ccd9832b42accf936e6b4403d27226c8de973ec0987d945

(this sample)

  
Dropped by
MD5 eb8b51ca53f8c988a68e99039efd5f2d
  
Delivery method
Distributed via e-mail attachment

Comments