No money, but Pony! From a mail to a trojan horse

In this post, we will take a high and low-level look at the Pony Trojan, delivered through a recent spam campaign. During our case study we showed some malicious samples being distributed in spam campaigns.Using this distribution method, malware is often found attached to the e-mail as either: an executable (also compressed, i.e. zip, rar or cab archive), sometimes […]