Some of the examples of the file names attachment found are:
- AntiVirus_update_package.7z, acquisition.7z, offer.7z, update_flashplayer10ax.7z
Once successfully installed, the Trojan connects to the C&C server over port 80/TCP and exfiltrate the victims IP address, information about the peers, and the dumped password hashes.
Recommendations/Countermeasures
- Poison Ivy communication can be detected by observing the network traffic. Deploy appropriate IPS and apply the following signatures to detect the Poison Ivy traffic. .
The information provided herein is on "as is" basis, without warranty of any kind.