Pony Icon above fragment of Khaled Desouki Photo tied to Tharir Square events |
<edit 2013-12-09>
Have been mentioned (and proved offline - Thanks Franc !) that the sample Spiderlabs is pointing too is not related to that Pony DB. It's a coincidence that it matches the scale.
--
Have fix this post accordingly
</edit>
AFAIK such a Huge Pony could be owned by only two teams.
The /Home/ Gang (Darkleech/Nymaim) or the ZGO Team (Gameover Zeus aka Zeus P2P)
(if you want to know more about those name please refer to : Paunch's arrest...The end of an Era ! )
I decided to write after reading :
FAQ: Pony Malware Payload Discovery published yesterday by SpiderLabs team.
Reply to the Hash of the Pony |
I figured out that I was the one who submitted it on 2013-06-06.
So I made some search and can tell you where this specific sample come from.
It belongs to the Gameover Zeus team. The one that was operating the Blackhole /Topic/ when Paunch got Arrested. In June the thread Folder was /news/ (this can be confusing cause same thread folder has been used later by another group that Conrad from Dynamoo Blog refer as ru:8080 )
Here is what I wrote in the "End of an Era post" :
"This is the blackhole with the highest number of threads. Not sure it can be operated by only one guy. Or he must be really well organised !
Distribution : Many compromised website (OT: they are also working a lot by mail attachments)
Threats : More than 60 threads. More than 2000 rotating samples a day.
The main activity is pushing Pony (different for many threads) as a loader for ZeusGameOver.
But we could see also : Medfos, MagicTraffic (PPI ClickFraud tied to Zaccess), some fakeav, even Kovter Ransomware."
That specific instance of pony was pushed in one of those thread. The one associated to the Blackhole file : abff4e31ce
You may find it in your logs (may/june at least) by looking for :
2v:2w:33:33:1j:32:1i:1g:30:32
which was the pattern for that specific file in June till Blackhole goes v2.1. Then that pattern became:
61626666346533316365
then
525357572h562g2e5456
and then
898a8e8ew98dw8w68b8d
etc....
This is the 2nd Parameter value of the Payload url...meaning if you see it...payload has been downloaded.
Illustration of 2nd Parameter value of the Payload url For another file : f6bd835642 |
Note : This was a way to follow a specific threat. I love graph and would be happy to show you a Fiddler of infection by this Pony...problem is that I don't have it...cause...wget is a far easier way to grab payload than High Interaction Honey Client. Yes wget <3 Blackhole :)
I have at least 480 items of that same rotating instance of Pony.
Here is the MD5 list : http://pastebin.com/raw.php?i=VTKCDDSE
Here are the samples
Disclaimer !!
I know that many other "instances" of Pony from this group were discussing with that same CnC infra. from other threads of same Blackhole, from fake Chrome/Flash update, from mail attachments. You already read about their activity multiple time. I just filtered the one that were from the exact same rotation...
To give you an idea, from the Blackhole of that team I grabbed from April to September around : 245 000 samples.
Now you may understand if I confess that i feel almost sad looking at the picture of Paunch published by CertGIB ;)
-- Side note :
They were not using the leaked version of Pony. Coder of that loader/stealer may even be member of that team (or at least was really tied to it)
Read More :
Two million stolen passwords: How to protect yourself - 2013-12-06 - Spiderlabs
FAQ: Pony Malware Payload Discovery - 2013-12-06 - Spiderlabs
Look What I Found: Moar Pony! 2013-12-03 - Daniel Chechik and Anat (Fox) Davidi - SpiderLabs
Paunch's arrest...The end of an Era ! 2013-10-11
Case of Pony downloading ZeuS via Passworded Zip Attachment of Malvertisement Campaign 2013-06-04 Hendrik Adrian - MalwareMustDie
ZeuS-P2P monitoring and analysis - PDF - 2013-06 - CertPL
Fake Adobe Flash Updates Resurface on the Web - 2013-01-24 - Jovi Umawing - ThreatTrack
The Lifecycle of Peer-to-Peer (Gameover) ZeuS - 2012-07-23 - Brett Stone-Gross, Dell SecureWorks
Look What I Found: Moar Pony! 2013-12-03 - Daniel Chechik and Anat (Fox) Davidi - SpiderLabs
Paunch's arrest...The end of an Era ! 2013-10-11
Case of Pony downloading ZeuS via Passworded Zip Attachment of Malvertisement Campaign 2013-06-04 Hendrik Adrian - MalwareMustDie
ZeuS-P2P monitoring and analysis - PDF - 2013-06 - CertPL
Fake Adobe Flash Updates Resurface on the Web - 2013-01-24 - Jovi Umawing - ThreatTrack
The Lifecycle of Peer-to-Peer (Gameover) ZeuS - 2012-07-23 - Brett Stone-Gross, Dell SecureWorks