Skip to content

Pony Malware - Detect

ID: pony-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: pony-malware
info:
name: Pony Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Pony.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}"
- "YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0"
- "POST %s HTTP/1.0"
- "Accept-Encoding: identity, *;q=0"
condition: and
# digest: 490a00463044022008ff68ef2892fec8a9869096421c5c7b7db5d8b8a888ce4e4c7c535ea38e99a002205ff170d39d89d507abac35aa7be063ef8554d6e606c990ea648d4d59a85800ad:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/pony-malware.yaml"

View on Github