Home / malwarePDF  

Infostealer.Pandebono


First posted on 25 April 2014.
Source: Symantec

Aliases :

There are no other names known for Infostealer.Pandebono.

Explanation :

The Trojan arrives through a USB connection to the ATM.

When the Trojan is executed, it creates the following files:
[DRIVE LETTER]:\PROCOL 3.0.exe%WinDir%\system32\winini.log%WinDir%\system32\umst\winpins.dmp%WinDir%\system32\umst\shadow.dmp%WinDir%\system32\res\smss.exe%WinDir%\system32\res\lsass.exe
The Trojan creates the following folders:
%WinDir%\system32\umst\%WinDir%\system32\res\
The Trojan creates the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Windows Net Logon

The Trojan creates a service with the following characteristics:
Service Name: Windows Net Logon

Note: The Trojan may terminate the malicious service by command.

The Trojan steals the following sensitive information:
Account dataPIN numbers
Note: The Trojan stores stolen information in the following file:
%WinDir%\system32\umst\winpins.dmp

The Trojan stores encrypted PIN numbers to be cracked offline (the process known as "carding") in the following file:
shadow.dmp

The Trojan uploads all the stolen data to the the USB removable drive if the removable drive root folder contains the following specific file:
copwincor.xxx

Last update 25 April 2014

 

TOP