New GamaPoS malware targets US companies
The Dell Sonicwall Threats Research team observed reports of a New POS family named GAV: GamaPOS.ABC. The POS Malware contains features such as memory scrapping functions like popular Point-of-Sale Trojan BlackPOS but this time the Malware spreading across United States through malicious emails that contain attachments such as macro-based malware Andromeda in the wild.
The POS Malware uses valid certificates to sign the malicious components to avoid detection by AVs.
- Detected as GAV: GAMAPOS.ABC (Trojan)
- Detected as GAV: GAMAPOS.ABD (Trojan)
The Malware adds the following files to the system:
- %Userprofile%All Usersjane.exe [ Execrable dropper ]
- %Userprofile%All Users _temp.dat [Key logger Log ]
The Malware adds the following key to the Windows registry to ensure persistence upon reboot:
The Malware uses multi component tools to grabbing information from the infected machine and uses legitimate code-signing certificates to avoid detection by AV Vendors.
GamaPOS retrieves a list of running processes; the malware is responsible for scraping the memory of current processes on the infected machine for credit card information periodically.
The malware installs key logger on the target machine and saves information to the _temp.dat file.
Here is an example:
Command and Control (C&C) Traffic
GamaPOS performs C&C communication over 1080 port. The malware sends your system information to its own C&C server via following format, here are some examples:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
- GAV: GamaPos.ABC [(Trojan)]]
- GAV: GamaPos.ABD [(Trojan)]]