MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d768486542d55538cb90b21c8563f395ed3d5148733e23a67bc5dba74b811233. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Pony
Vendor detections: 3
| SHA256 hash: | d768486542d55538cb90b21c8563f395ed3d5148733e23a67bc5dba74b811233 |
|---|---|
| SHA3-384 hash: | eded2fadc2a0a88052300dc01eba9956c811c1a99fc7f08b12603730470d6a46b839da0a75e36ded4cc07f4343b04a68 |
| SHA1 hash: | 12c789d04f3feb0e62bdb09ead849a54e2175882 |
| MD5 hash: | 4d4a51025d7ac625fbc4243d8043b0e2 |
| humanhash: | item-lake-alabama-cold |
| File name: | Otsylka za proshlyj i za etot mesyac.exe |
| Download: | download sample |
| Signature | Pony |
| File size: | 184'896 bytes |
| First seen: | 2020-05-27 11:54:50 UTC |
| Last seen: | 2020-05-27 13:17:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7fd1635592875f20f32ecd49c75b512f (1 x Pony) |
| ssdeep | 1536:feeSYFlMkGbCQIg2VLew4jN2YxfVOm+BzxMU7gAhAN4MhA1AN4MhA1T89T:G06k/QI5CwQHVOlpy4ANPMANPMTO |
| Threatray | 145 similar samples on MalwareBazaar |
| TLSH | 55044CC3B442A86FF8CE057B7489CEB3A1E15CA20A47694335B83FA67F212D163C5567 |
| Reporter | |
| Tags: | exe geo Pony RUS |
Code Signing Certificate
| Organisation: | GVMOXNIIPFNCWPOVZJ |
|---|---|
| Issuer: | GVMOXNIIPFNCWPOVZJ |
| Algorithm: | sha1WithRSA |
| Valid from: | May 27 04:10:21 2020 GMT |
| Valid to: | Dec 31 23:59:59 2039 GMT |
| Serial number: | 70ECC201A963BCAB46EF056B39BFF5EF |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 74CEA86A273E6818E7BBFB62FB0856680B801802B4DF2F7DB007F1B5F4CC8003 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
abuse_ch
Malspam distributing Pony:HELO: ds13.centre.ru
Sending IP: 194.67.34.87
From: zakaz@grassco.ru
Reply-To: anastasbobrova65@rambler.ru
Subject: Рассылка за этот месяц
Attachment: Otsylka za proshlyj i za etot mesyac.001 (contains "Otsylka za proshlyj i za etot mesyac.exe")
Pony C2:
http://142.202.190.43/p/z05857687.php
Intelligence
File Origin
# of uploads :
2
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Grp
Status:
Malicious
First seen:
2020-05-27 12:38:47 UTC
File Type:
PE (Exe)
Extracted files:
67
AV detection:
21 of 31 (67.74%)
Threat level:
5/5
Verdict:
malicious
Label(s):
pony
Similar samples:
+ 135 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
9/10
Tags:
cryptone packer spyware
Behaviour
Runs ping.exe
Script User-Agent
Suspicious use of WriteProcessMemory
Deletes itself
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.