Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
30
Global rank
118 infographic chevron month
Month rank
105
Week rank
0
IOCs

Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America.

Stealer
Type
Unknown
Origin
1 January, 2011
First seen
14 December, 2025
Last seen
Also known as
Fareit
Siplog

How to analyze Pony with ANY.RUN

Type
Unknown
Origin
1 January, 2011
First seen
14 December, 2025
Last seen

IOCs

IP addresses
103.195.236.181
207.241.224.2
203.170.81.33
212.58.20.11
89.12.148.197
74.91.117.64
151.106.124.106
45.196.119.115
104.21.13.228
172.67.133.102
81.169.145.86
67.215.225.205
85.192.165.229
116.122.158.195
87.247.241.226
107.180.4.94
66.111.4.54
176.32.230.23
66.111.4.53
74.208.236.90
Hashes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hsatg.su
lv-contracting.com
campcosupply.com
akte2100.com
talentos.clicken1.com
johnmejalli.com
nwheilcopters.com
sharonbooks.ru
sendergrid.club
dunysaki.ru
gtrtooloo.com
carikapapa.ml
auctlon-uk.com
stauniverseqp.com
zub.http80.info
acodeert.ru
a6281279.yolox.net
preutainer.ml
grandmoney.ml
myp0nysite.ru
URLs
http://4.pianetapollo.com/forum/viewtopic.php
http://91.121.84.204:8080/pony/gate.php
http://98.158.129.17:8080/pony/gate.php
http://davesclassics.com.au/tmp/file1.exe
http://davesclassics.com.au/tmp/file2.exe
http://globalofficesolution.net/tmp/file1.exe
http://globalofficesolution.net/tmp/file2.exe
http://japmotors.net/tmp/r1.php
http://212.58.20.11/forum/viewtopic.php
http://63.251.20.180/pony/gate.php
http://67.215.225.205:8080/ponyd/gate.php
http://www.cordilleraescalera.com/images/2.gif/gate.php
http://skid.com/calculator.exe
http://magic-skid.com/shit.exe
http://londonpaerl.co.uk/yesup/gate.php
http://nmixer.uphero.com/gate.php
http://78.129.132.239:8080/pony/gate.php
http://66.175.212.25/pony/gate.php
http://185.145.129.36/v6/gate.php
http://seelend.com/ebere/panelnew/gate.php
Last Seen at

Recent blog posts

post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 121
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 268
comments 0
post image
AI Sigma Rules: Scale Threat Detection, Drive...
watchers 4543
comments 0

What is Pony malware?

Pony, also known as Fareit or Siplog, is an information stealer and loader – a malware used to collect data from infected machines and install other malicious programs. This particular virus was First Spotted in the wild in 2011. It is known to attack users primarily in Europe and North America.

The earliest discovered version of Pony stealer is 1.7, and the latest updated known version is 2.2. Though being regularly updated, the malware did not gain groundbreakingly new features since the time of its first discovery by Microsoft. In addition to the core functionality, Pony can also steal cryptocurrency wallet credentials, FTP clients, and autofill values from the browsers.

In contrast to the majority of botnets, Pony stealer does not require a centralized C&C server or a group of C&C servers to carry out its attacks. Instead, each attacker can set up their own custom control server or purchase a server that was previously set up by another criminal, instantly gaining access to infrastructure that provides reports about the stolen data. In addition, the malware itself can be divided into two modules, the builder, which is used to construct clients that are then have to be downloaded on the victim’s machine to collect data, and the bot itself – the final payload.

General description of Pony malware

The robust functionality of Pony trojan helped this malware to keep its position as the most popular password stealer through 5 years. Apart from being able to steal credentials the same as RedLine, malware can disable certain antivirus and windows security features and run in the background completely hidden from the user, who may not have a clue that his or her PC is, in fact, infected. When activated, Pony stealer can use the infected PC to take part in botnet attacks, for example, using a hijacked machine to send spam emails. Pony can also download other malware to the victim’s machine and send harvested personal data to a destination specified by the attacker.

What’s more, Pony has been mentioned by multiple “hacker celebrities” as the backbone of many attack campaigns. For instance, the author of the infamous Andromeda botnet has referred to Pony as the “titanic work of the author of miracle (Fareit Bot),” further stating that the loader was incorporated in the Andromeda botnet attacks as a plug-in.

Part of the malware’s popularity is because the source code of multiple Pony loader versions has been leaked and is available for download on the darknet. Particularly, the source code of Pony builder and loader versions 1.9 and 2.0 are available for download on several underground forums.

The Pony stealer builder is a program that attackers can use to construct custom Pony bots with pre-programmed C&C addresses, where stolen data can be sent. The Pony Bot is the actual program that is used for information stealing. According to the analysis, the Bot is written primarily in assembly language. A peculiar feature of this malware that separates it from the rest of the pack is its unique decoding technique. The Bot itself does not come equipped with a decoding algorithm, instead of using just simple functions that are programmed to send encrypted information to the control server, where stolen passwords and other data are decrypted.

Even though the core feature-set of Pony trojan has not changed drastically over the course of its lifespan, newer versions of the malware gained several anti-detection features designed to prevent research and disassembly of the malware. As such, in addition to standard anti-evasion and debugging techniques, each attacker has the ability to implement various packers, including custom ones, to avoid detection by antivirus software.

With the use of Packers, the malware gains a Russian “matryoshka” nesting-doll like-design. While the payload is inactive when the package containing Pony stealer is analyzed, the final payload cannot be detected by antivirus signatures since it is hidden in the innermost and smallest package. However, once activated, the Pony loader has to unpack itself, thus revealing its presence.

Pony malware analysis

A video of a simulation recorded in ANY.RUN malware hunting service helps us to perform the analysis of the behavior of Pony in-depth.

process graph of the pony execution Figure 1: A process graph generated by ANY.RUN enables to examine the lifecycle of Pony in a visual form

text report of a Pony analysis Figure 2: Customizable text reports provided by ANY.RUN gives more opportunities for research or sharing of study results

Pony malware execution process

In the case of our simulation, after the user ran the malicious file, the malware launched itself. Next, the malicious executable file connected to the C2 server and started stealing information from the infected system. It should be noted that in some cases, Pony is known to download other malware to the victim’s machine.

Distribution of Pony malware

Based on the analysis, Pony is distributed in multiple ways, including email spam campaigns, exploit kits and DNS poisoning. Also, Pony can be hidden within free downloadable online programs and can mimic legitimate software. For example, malicious emails usually include either a Microsoft Word archive or a JavaScript file. As soon as the document is downloaded and opened, Pony injects the victim’s PC and starts execution.

Another attack vector of Pony is through a compromised DNS server which is infected by another malware. In this case, the victim is redirected to a malicious website from where Pony downloads itself onto the users’ PC.

How to detect Pony stealer using ANY.RUN?

Analysts can perform an analysis of what changes the malware made in the registry. Just click on the process and then on the button "More Info" in the appeared window. Then, in the "Advanced details of process" window, switch to the "Registry changes" tab. Note that you can switch between the friendly and raw display of changes. You can also try this method while analyzing GootKit or Danabot.

pony fareit registry changes Figure 3: Registry changes made by Pony

Conclusion

Availability and robust feature set helped make Pony stealer one of the most widely used information stealers. In fact, this malware is regularly being used in attacks targeting Europe and North America. The danger of Pony attacks is further enhanced by its nesting-doll-like design, where the final payload hides within a layered package, allowing to avoid easy detection. Interactive malware hunting service ANY.RUN gives researchers the ability to take a look at how this dangerous malware functions and examine its behavior in action in a safe environment.

HAVE A LOOK AT

Gh0st RAT screenshot
Gh0st RAT
gh0st
Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.
Read More
RondoDox screenshot
RondoDox
rondodox
RondoDox is an emerging Linux-based botnet malware that exploits dozens of known vulnerabilities in internet-facing devices like routers, DVRs, and web servers to build massive networks for DDoS attacks, cryptomining, and data exfiltration. First spotted in mid-2025, its "exploit shotgun" tactic (firing multiple payloads at once) has made it a rapid escalator in the IoT threat landscape, compromising unpatched edge devices worldwide.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
Bluesky Ransomware screenshot
BlueSky ransomware, first identified in June 2022, shares code similarities with other well-known ransomware families like Conti and Babuk. It primarily spreads via phishing emails and malicious links and can propagate through networks using SMB protocols. BlueSky uses advanced evasion techniques, such as hiding its processes from debuggers via the NtSetInformationThread API, making it difficult for analysts to detect and mitigate its attacks.
Read More
MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More