Carding

Professional
Messages
2,830
Reputation
17
Reaction score
2,062
Points
113
When i've view this post, content was already removed and member Banned.
08-01-2013+14-22-55.png


vSkimmer - Virtual Skimmer

Functions:
- Track 2 grabber
- HTTP Loader (Download & Execute)
- Update bot itself

Working Modes:
- Online: If internet is reachable it will try to bypass firewalls and communicate to a the control panel.
- Offline: If internet is not reachable it wait for a specific pendrive/flashdrive plugged in and copy logs to it.

Server coded in PHP (can be modified on request to send logs to remote server, via smtp, etc.. )
Client coded in C++ no dependencies, 66kb, cryptable. (can be customized)

SaW8H.png

OpOZp.png

ijnhI.png


The malware check the presence of debugger:
08-01-2013+15-12-02.png


Get PC details (OS,Computer name, GUID for identify you in the POS botnet, etc..)
08-01-2013+15-53-07.png


Check if the file is executed from %APPDATA% if not add registry persistence, firewall rule, make a copy and execute the copy:
08-01-2013+15-59-13.png


Detail of the registry persistence:
08-01-2013+16-29-57.png


Firewall rule to allow the malware:
08-01-2013+18-55-47.png


Create a mutex, thread and get host information:
08-01-2013+16-20-42.png


Check for process:
08-01-2013+16-35-12.png


Some are whitlisted: "System", smss.exe, csrss.exe, winlogon.exe, services.exe, lsass.exe, svchost.exe, spoolsv.exe, wscntfy.exe, alg.exe, mscorsvw.exe, ctfmon.exe, explorer.exe:
08-01-2013+16-44-11.png


And when finally a process is found:
08-01-2013+16-47-33.png


Read the process and search for pattern:
08-01-2013+17-59-01.png


If nothing found:
08-01-2013+19-46-47.png


Get infos, Base64 and call the gate via GET request:
08-01-2013+17-45-11.png


Answer:
08-01-2013+18-17-12.png

• dns: 1 ›› ip: 31.31.196.44 - adresse: WWW.POSTERMINALWORLD.LA

Parse the answer:
08-01-2013+18-19-17.png


Answer is reduced to first 3 letters and compared with 'dlx' (Download & Execute) and 'upd' (Update) if one of these are found that mean the bad guys send us an order.

For example dlx:
08-01-2013+18-38-23.png


Order is executed and a response is send to the server:
08-01-2013+18-30-55.png


The part i love with pos malware:
09-01-2013+17-34-27.jpg


Or just a simple ";1234567891234567=12345678912345678900?" in a txt but it's more gangsta to swipe a card.
So the algo detect the pattern, the track2 is encoded to base64
08-01-2013+20-18-05.png


And sent to the panel:
08-01-2013+19-34-41.png


Now for the offline mode, get drive:
08-01-2013+20-24-14.png


The flash drive must be named "KARTOXA007" (dumps in russian)
08-01-2013+20-37-43.png


08-01-2013+20-41-47.png


Create dmpz.log:
08-01-2013+21-03-34.png


Now let's have a look on the panel:
09-01-2013+18-00-31.jpg


POS Terminals:
09-01-2013+18-01-28.jpg


Dump download:
09-01-2013+18-05-32.jpg


Commands:
09-01-2013+18-03-53.jpg


Settings:
09-01-2013+18-04-27.jpg


Dumped.. :)
25-01-2013+20-28-22.png


Sample:
https://www.virustotal.com/file/bb1...3be12ae44634ee559da91bc0/analysis/1358237597/
Unpack:
https://www.virustotal.com/file/4fb...339b995422c01a1a96532ca3/analysis/1358238314/
Thanks Zora for the sample :)

(c) https://www.xylibox.com/2013/01/vskimmer.html
 
Top