Variant of Pony Botnet Pickpockets Bitcoin Users

Last month the Pony Botnet became a household name when it was revealed that it had stolen more than two million social networking account passwords. This rather eye-catching headline is a side effect of the data that the botnet actually steals, which includes stored passwords, cache, and cookies from the following applications:

 

Chrome Cyberduck LeechFTP
Firefox Epic LinasFTP
Internet Explorer ExpanDrive Martin Prikryl
Opera FFFTP NCH Software
Windows Live Mail FileZilla NetSarang
BatMail FlashFXP Nichrome
BlazeFtp Fling NovaFTP
Bromium FTP Explorer Pocomail
BulletProof FTP FTPClient PuTTY
Chromium FTPHost Robo-FTP 3.7
ClassicFTP FTPRush RockMelt
Comodo FTPVoyager SFTP
Cryer Ghisler Thunderbird
CuteFTP 6, 7, 8 Global Downloader VanDyke
CuteFTP Lite K-Meleon Visicom Media
CuteFTP Pro LeapFTP

McAfee offers detection for Pony Botnet as Backdoor-FJW. This malware did not change much between May and November 2013, aside from the common tricks of malware authors to use custom packers to obfuscate their code from analysis. During a recent analysis of this threat, however, we have discovered a variant of the botnet that has added a small trick to its repertoire.

Once we removed the malware from its obfuscated shell we were able to see two small but important additions to the strings we would normally see in a pony botnet sample.

The preceding image shows the strings “wallet.dat” and “\Bitcoin” have been appended to the list of strings that we commonly see associated with this threat.Bitcoin has been in the news during the past year for its rising popularity, value, and the attention it has attracted from the cybercrime community. However, this is the first malware we have analyzed that seeks wallet.dat for exfiltration from a system. A close look at the functions used to accomplish this reveals that they work in much the same way that the malware has always stolen FTP credentials and server information.Using hardcoded strings and file names, the malware locates specific installed software from the list above in the registry and then extracts data from the data files known to coincide with that software.

The malware operates in similar fashion here:

There are two important takeaways from this analysis. The first is that encrypting your important information (Bitcoin wallet, confidential data, login information, etc.) cannot be overlooked. Simply having an encrypted Bitcoin wallet would render this new module useless for the malware authors. The second is that storing passwords or credentials in browsers or other software that you use to connect to any remote host is a bad idea. The threat landscape is constantly evolving: Even threats that have seemingly run their course pop up again with new tricks to meet their monetary goals.

Introducing McAfee+

Identity theft protection and privacy for your digital life

FacebookLinkedInTwitterEmailCopy Link

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS

More from McAfee Labs

Back to top