PosCardStealer
Description
(Panda Security) The first attack we were able to analyze took place September 30, 2015 and affected 30 PoS systems. The malware was installed using PowerShell, a popular Windows tool. With this tool the file (MD5: 0B4F921CF2537FCED9CAACA179F6DFF4) was executed, with an internal date of creation for two days before (28/09/2015 17:07:59) and compiled with C++ visuals.
The installer’s job is to infect the system with malware that is specifically designed for PoS systems. To do this, it uses different techniques in function with the PoS software installed on the system. In concrete, it looks for brain.exe (pertaining to Dinerware) and scpwin.exe processes, and installs the malware as follows depending on which of the two it finds.
Names
Name |
---|
PosCardStealer |
Category
Malware
Type
- POS malware
- Credential stealer
Information
Malpedia
Other Information
Uuid
2d486642-f5ab-4f5f-8248-8a3085e06c82
Last Card Change
2020-05-25