Home / malwarePDF  

Infostealer.Jackpos


First posted on 21 February 2014.
Source: Symantec

Aliases :

There are no other names known for Infostealer.Jackpos.

Explanation :

When the Trojan is executed, it creates the following hidden folder:
%UserProfile%\Application Data\Java SE Platform Updater

Next, the Trojan may copy itself to any of the following files:%UserProfile%\Application Data\Java SE Platform Updater\jusched.exe%UserProfile%\Application Data\Java SE Platform Updater\jucheck.exe%UserProfile%\Application Data\Java SE Platform Updater\javaw.exe%UserProfile%\Application Data\Java SE Platform Updater\jureg.exe%UserProfile%\Application Data\Java SE Platform Updater\jse.exe%UserProfile%\Application Data\Java SE Platform Updater\java.exe%UserProfile%\Application Data\Java SE Platform Updater\javaws.exe%UserProfile%\Application Data\Java SE Platform Updater\javacpl.exe
The Trojan then creates the following file:
%Temp%\svchost.exe

The Trojan then creates the following registry entries:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Java SE Platform Updater" = "\"%UserProfile%\Application Data\Java SE Platform Updater\[COPIED FILE NAME].exe\""HKEY_CURRENT_USER\Software\Javaw\"Pid" = "[PROCESS ID OF COPIED FILE NAME]"HKEY_CURRENT_USER\Software\Javaw\"Pid1" = "[PROCESS ID OF %Temp%\svchost.exe]"
The Trojan then connects to the following remote location:
[http://]192.168.13.1/post/ec[REMOVED]

The Trojan may then perform the following activities:Search through processes for track one and track two data from credit cardsEncrypt and send data to [http://]192.168.13.1/post/ec[REMOVED]Update itselfExecute filesEnd processes

Last update 21 February 2014

 

TOP