Difference between revisions of "FighterPOS"

From Botnets.fr
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Botnet
{{Botnet
|Introduction=Related to (code inspired from): [[variant of::vnLoader]]
|Introduction=Related to (code inspired from): [[variant of::vnLoader]]
|Feature=DDoS,
|Alias=BRFighter,
|Checksum=0aea8f97ecbd4b9dbdae336f7310d35af8883bae,
|Target=Brazil,
|Feature=DDoS, Credit card data theft, Memory scrapping, Keylogger,
|Checksum=0aea8f97ecbd4b9dbdae336f7310d35af8883bae, 55fb03ce9b698d30d946018455ca2809, 55fb03ce9b698d30d946018455ca2809,
|Programming language=Visual Basic 6,
|BeginYear=2014
|BeginYear=2014
|Group=Point-of-sale,
|Group=Point-of-sale,
}}
}}

Latest revision as of 05:35, 22 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

FighterPOS
Alias BRFighter
Group Point-of-sale
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Brazil
Origin
Distribution vector
UserAgent
CCProtocol
Activity 2014 /
Status
Language
Programming language Visual Basic 6
Operation/Working group

Introduction

Related to (code inspired from): vnLoader

Features


Associated images

Checksums / AV databases

  • 0aea8f97ecbd4b9dbdae336f7310d35af8883bae | Virustotal




Publications

 AuthorEditorYear
FighterPOS: a new one-man PoS malware campaignTrend Micro Forward-Looking Threat Research TeamTrend Micro2015
One-man PoS malware operation captures 22,000 credit card details in BrazilTrendLabs Security Intelligence Blog2015