Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
36
Global rank
112 infographic chevron month
Month rank
107
Week rank
0
IOCs

Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America.

Stealer
Type
Unknown
Origin
1 January, 2011
First seen
16 October, 2025
Last seen
Also known as
Fareit
Siplog

How to analyze Pony with ANY.RUN

Type
Unknown
Origin
1 January, 2011
First seen
16 October, 2025
Last seen

IOCs

IP addresses
103.195.236.181
207.241.224.2
203.170.81.33
212.58.20.11
89.12.148.197
74.91.117.64
151.106.124.106
45.196.119.115
172.67.133.102
104.21.13.228
81.169.145.86
67.215.225.205
85.192.165.229
116.122.158.195
87.247.241.226
107.180.4.94
66.111.4.54
176.32.230.23
66.111.4.53
74.208.236.90
Hashes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nwheilcopters.com
pakarabi.net
stauniverseqp.com
myp0nysite.ru
acodeert.ru
carikapapa.ml
auctlon-uk.com
dunysaki.ru
gtrtooloo.com
preutainer.ml
a6281279.yolox.net
grandmoney.ml
uy-akwaibom.ru
ezpz1.xyz
sharonbooks.ru
zub.http80.info
efficienci.ml
chainonline.info
fav121.hopto.org
sendergrid.club
URLs
http://91.121.84.204:8080/pony/gate.php
http://98.158.129.17:8080/pony/gate.php
http://63.251.20.180/pony/gate.php
http://londonpaerl.co.uk/yesup/gate.php
http://t00lz.sourceforge.net/pony/gate.php
http://reservehost.com/path/gate.php
http://mainserver.com/gate.php
http://www.oldhorse.info/
http://oldhorse.info/a.php
http://jimmyxyz.com/002/gate.php
http://3.124.104.244:58755/gate.php
http://www.arki.com:8080/ponyb/gate.php
http://arki.com:8080/ponyb/gate.php
http://tavana-es.com:443/myman/shit.exe
http://tavana-es.com/myman/shit.exe
http://tavana-es.com/myman/gate.php
http://seolinkmarket.com/idx.php
http://cmp.com.sg/signal/Deffult/gate.php
http://cmp.com.sg/signal/Deffult/book.exe
http://www.cmp.com.sg/signal/Deffult/book.exe
Last Seen at

Recent blog posts

post image
5 Ways Threat Intelligence Saves Businesses M...
watchers 373
comments 0
post image
New Malware Tactics: Cases & Detection Ti...
watchers 1502
comments 0
post image
How to Grow SOC Team Expertise for Ultimate T...
watchers 742
comments 0

What is Pony malware?

Pony, also known as Fareit or Siplog, is an information stealer and loader – a malware used to collect data from infected machines and install other malicious programs. This particular virus was First Spotted in the wild in 2011. It is known to attack users primarily in Europe and North America.

The earliest discovered version of Pony stealer is 1.7, and the latest updated known version is 2.2. Though being regularly updated, the malware did not gain groundbreakingly new features since the time of its first discovery by Microsoft. In addition to the core functionality, Pony can also steal cryptocurrency wallet credentials, FTP clients, and autofill values from the browsers.

In contrast to the majority of botnets, Pony stealer does not require a centralized C&C server or a group of C&C servers to carry out its attacks. Instead, each attacker can set up their own custom control server or purchase a server that was previously set up by another criminal, instantly gaining access to infrastructure that provides reports about the stolen data. In addition, the malware itself can be divided into two modules, the builder, which is used to construct clients that are then have to be downloaded on the victim’s machine to collect data, and the bot itself – the final payload.

General description of Pony malware

The robust functionality of Pony trojan helped this malware to keep its position as the most popular password stealer through 5 years. Apart from being able to steal credentials the same as RedLine, malware can disable certain antivirus and windows security features and run in the background completely hidden from the user, who may not have a clue that his or her PC is, in fact, infected. When activated, Pony stealer can use the infected PC to take part in botnet attacks, for example, using a hijacked machine to send spam emails. Pony can also download other malware to the victim’s machine and send harvested personal data to a destination specified by the attacker.

What’s more, Pony has been mentioned by multiple “hacker celebrities” as the backbone of many attack campaigns. For instance, the author of the infamous Andromeda botnet has referred to Pony as the “titanic work of the author of miracle (Fareit Bot),” further stating that the loader was incorporated in the Andromeda botnet attacks as a plug-in.

Part of the malware’s popularity is because the source code of multiple Pony loader versions has been leaked and is available for download on the darknet. Particularly, the source code of Pony builder and loader versions 1.9 and 2.0 are available for download on several underground forums.

The Pony stealer builder is a program that attackers can use to construct custom Pony bots with pre-programmed C&C addresses, where stolen data can be sent. The Pony Bot is the actual program that is used for information stealing. According to the analysis, the Bot is written primarily in assembly language. A peculiar feature of this malware that separates it from the rest of the pack is its unique decoding technique. The Bot itself does not come equipped with a decoding algorithm, instead of using just simple functions that are programmed to send encrypted information to the control server, where stolen passwords and other data are decrypted.

Even though the core feature-set of Pony trojan has not changed drastically over the course of its lifespan, newer versions of the malware gained several anti-detection features designed to prevent research and disassembly of the malware. As such, in addition to standard anti-evasion and debugging techniques, each attacker has the ability to implement various packers, including custom ones, to avoid detection by antivirus software.

With the use of Packers, the malware gains a Russian “matryoshka” nesting-doll like-design. While the payload is inactive when the package containing Pony stealer is analyzed, the final payload cannot be detected by antivirus signatures since it is hidden in the innermost and smallest package. However, once activated, the Pony loader has to unpack itself, thus revealing its presence.

Pony malware analysis

A video of a simulation recorded in ANY.RUN malware hunting service helps us to perform the analysis of the behavior of Pony in-depth.

process graph of the pony execution Figure 1: A process graph generated by ANY.RUN enables to examine the lifecycle of Pony in a visual form

text report of a Pony analysis Figure 2: Customizable text reports provided by ANY.RUN gives more opportunities for research or sharing of study results

Pony malware execution process

In the case of our simulation, after the user ran the malicious file, the malware launched itself. Next, the malicious executable file connected to the C2 server and started stealing information from the infected system. It should be noted that in some cases, Pony is known to download other malware to the victim’s machine.

Distribution of Pony malware

Based on the analysis, Pony is distributed in multiple ways, including email spam campaigns, exploit kits and DNS poisoning. Also, Pony can be hidden within free downloadable online programs and can mimic legitimate software. For example, malicious emails usually include either a Microsoft Word archive or a JavaScript file. As soon as the document is downloaded and opened, Pony injects the victim’s PC and starts execution.

Another attack vector of Pony is through a compromised DNS server which is infected by another malware. In this case, the victim is redirected to a malicious website from where Pony downloads itself onto the users’ PC.

How to detect Pony stealer using ANY.RUN?

Analysts can perform an analysis of what changes the malware made in the registry. Just click on the process and then on the button "More Info" in the appeared window. Then, in the "Advanced details of process" window, switch to the "Registry changes" tab. Note that you can switch between the friendly and raw display of changes. You can also try this method while analyzing GootKit or Danabot.

pony fareit registry changes Figure 3: Registry changes made by Pony

Conclusion

Availability and robust feature set helped make Pony stealer one of the most widely used information stealers. In fact, this malware is regularly being used in attacks targeting Europe and North America. The danger of Pony attacks is further enhanced by its nesting-doll-like design, where the final payload hides within a layered package, allowing to avoid easy detection. Interactive malware hunting service ANY.RUN gives researchers the ability to take a look at how this dangerous malware functions and examine its behavior in action in a safe environment.

HAVE A LOOK AT

Grandoreiro screenshot
Grandoreiro
grandoreiro
Grandoreiro is a Latin American banking trojan first observed in 2016. It targets mostly Spanish-speaking countries, such as Brazil, Spain, Mexico and Peru. This malware is operated as a Malware-as-a-Service (MaaS), which makes it easily accessible for cybercriminals. Besides, it uses advanced techniques to evade detection.
Read More
Lumma screenshot
Lumma
lumma
Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.
Read More
Play Ransomware screenshot
Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
Godfather screenshot
Godfather
godfather
The Godfather malware is an Android banking Trojan capable of bypassing MFA that targets mobile banking and cryptocurrency applications. Known for its ability to evade detection and mimic legitimate software, it poses a significant threat to individuals and organizations by stealing sensitive data and enabling financial fraud.
Read More