PULSE NAME
New POS Malware Emerges - Punkey
WHITE AlienVault 2015-04-20 Modified: 2015-04-20
7
IOCs
LOW VOLUME
During a recent United States Secret Service investigation, Trustwave encountered a new family of POS malware, that we named Punkey. It appears to have evolved from the NewPOSthings family of malware first discovered by Dennis Schwarz and Dave Loftus at Arbor Networks. While this malware shares some commonalities with that family, it departs from the standard operating procedure of the previous versions rather dramatically. In a blog post, TrendMicro also detailed recently compiled versions of the NewPOSthings family that bear a closer resemblance to NewPOSthings than Punkey. This suggests that multiple actors may be using similar source code, or the malware is being customized as a service for targeted campaigns. Because of the active investigation, I cannot reveal C&C domains used in the samples.
Indicators of Compromise (7)
All FileHash-SHA256
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 0a33332d200e52875c00ea98417b71621b77a9dc291e6a3bdbd69569aac670cf 2015-04-20
FileHash-SHA256 e0c4696093c71a8bbcd2aef357afca6c7b7fbfe787406f6797636a67ae9b975d 2015-04-20
FileHash-SHA256 6c7a26ac738c940cdce1e0fcbd9995994ce19332ea444c4ea87de52d2fe9713b 2015-04-20
FileHash-SHA256 e06f57b984d52153d28bdf9e2629feb16e2dbdea617702fb3397c959ee70ed68 2015-04-20
FileHash-SHA256 1dd9e1e661070c0d90faeef75d5a487641a4bfb99c58841827ee5b97e6315eaf 2015-04-20
FileHash-SHA256 5ce1e0f1883d13561f9a1cef321db13c4fefddf4fed1d40e7e31f3b04595f527 2015-04-20
FileHash-SHA256 04678de7a93ca1fd7fc7eba1672ec04c9855160b4cace440cfcd3c66d8543026 2015-04-20