Names | vSkimmer | |
Category | Malware | |
Type | POS malware, Reconnaissance, Backdoor, Credential stealer, Botnet | |
Description | (XyliBox) Functions: - Track 2 grabber - HTTP Loader (Download & Execute) - Update bot itself Working Modes: - Online: If internet is reachable it will try to bypass firewalls and communicate to a the control panel. - Offline: If internet is not reachable it wait for a specific pendrive/flashdrive plugged in and copy logs to it. Server coded in PHP (can be modified on request to send logs to remote server, via smtp, etc.. ) Client coded in C++ no dependencies, 66kb, cryptable. (can be customized) | |
Information | <https://www.xylibox.com/2013/01/vskimmer.html> <http://vkremez.weebly.com/cyber-security/-backdoor-win32hesetoxa-vskimmer-pos-malware-analysis> <https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf> <https://www.secureworks.com/research/point-of-sale-malware-threats> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.vskimmer> |
Last change to this tool card: 25 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |