Names | ATMii | |
Category | Malware | |
Type | ATM malware, Backdoor | |
Description | (Kaspersky) ATMii was first brought to our attention in April 2017, when a partner from the financial industry shared some samples with us. The malware turned out to be fairly straightforward, consisting of only two modules: an injector module (exe.exe, 3fddbf20b41e335b6b1615536b8e1292) and the module to be injected (dll.dll, dc42ed8e1de55185c9240f33863a6aa4). To use this malware, criminals need direct access to the target ATM, either over the network or physically (e.g. over USB). ATMii, if it is successful, allows criminals to dispense all the cash from the ATM. | |
Information | <https://securelist.com/atmii-a-small-but-effective-atm-robber/82707/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.atmii> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:atmii> |
Last change to this tool card: 24 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |