Skip to content

Windows Pony Stealer Malware - Detect

ID: pony-stealer-malware

Severity: info

Author: daffainfo

Tags: malware,file,pony,stealer

id: pony-stealer-malware
info:
name: Windows Pony Stealer Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/windows/malware_windows_pony_stealer.yara
tags: malware,file,pony,stealer
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "signons.sqlite"
- "signons.txt"
- "signons2.txt"
- "signons3.txt"
- "WininetCacheCredentials"
- "moz_logins"
- "encryptedPassword"
- "FlashFXP"
- "BulletProof"
- "CuteFTP"
condition: and
case-insensitive: true
# digest: 4a0a00473045022100b8fa8e1308cc3bc0157c0790af6a94d98045f753259f654dc92c7b901a785cfb0220249f4c1c8b11cac550beb85e61936cc99850ae456729482a47d42f462bc8fa6c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/pony-stealer-malware.yaml"

View on Github