SYMBOLCOMMON_NAMEaka. SYNONYMS
win.poslurp (Back to overview)

PoSlurp

aka: PUNCHTRACK

Actor(s): FIN8


There is no description at this point.

References
2019-12-31One Night in NorfolkNorfolk
@online{norfolk:20191231:fuel:37d7e73, author = {Norfolk}, title = {{Fuel Pumps II – PoSlurp.B}}, date = {2019-12-31}, organization = {One Night in Norfolk}, url = {https://norfolkinfosec.com/fuel-pumps-ii-poslurp-b/}, language = {English}, urldate = {2020-01-08} } Fuel Pumps II – PoSlurp.B
PoSlurp
2019-08-15Twitter (@just_windex)Windex
@online{windex:20190815:poslurpb:29adb6b, author = {Windex}, title = {{Tweet on PoSlurp.B}}, date = {2019-08-15}, organization = {Twitter (@just_windex)}, url = {https://twitter.com/just_windex/status/1162118585805758464}, language = {English}, urldate = {2020-01-09} } Tweet on PoSlurp.B
PoSlurp
2019-07-23GigamonKristina Savelesky, Ed Miles, Justin Warner
@online{savelesky:20190723:abadbabe:061c7a8, author = {Kristina Savelesky and Ed Miles and Justin Warner}, title = {{ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling}}, date = {2019-07-23}, organization = {Gigamon}, url = {https://atr-blog.gigamon.com/2019/07/23/abadbabe-8badf00d-discovering-badhatch-and-a-detailed-look-at-fin8s-tooling/}, language = {English}, urldate = {2020-02-09} } ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling
PoSlurp Powersniff
2017-06-19root9broot9b
@techreport{root9b:20170619:shelltea:223ad32, author = {root9b}, title = {{SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry}}, date = {2017-06-19}, institution = {root9b}, url = {https://www.root9b.com/sites/default/files/whitepapers/PoS%20Malware%20ShellTea%20PoSlurp.pdf}, language = {English}, urldate = {2021-03-24} } SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
PoSlurp FIN8
Yara Rules
[TLP:WHITE] win_poslurp_auto (20230715 | Detects win.poslurp.)
rule win_poslurp_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.poslurp."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.poslurp"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b1d???????? 488d4c2430 2b1d???????? ff15???????? 488d542458 488d4c2430 ff15???????? }
            // n = 7, score = 100
            //   8b1d????????         |                     
            //   488d4c2430           | test                ecx, ecx
            //   2b1d????????         |                     
            //   ff15????????         |                     
            //   488d542458           | jne                 0x1e01
            //   488d4c2430           | mov                 ecx, dword ptr [esi + 0x10]
            //   ff15????????         |                     

        $sequence_1 = { 8905???????? 3b05???????? 7312 33c9 ff15???????? cc 33c9 }
            // n = 7, score = 100
            //   8905????????         |                     
            //   3b05????????         |                     
            //   7312                 | mov                 eax, ebp
            //   33c9                 | test                eax, eax
            //   ff15????????         |                     
            //   cc                   | je                  0x1cbe
            //   33c9                 | dec                 ecx

        $sequence_2 = { 488b7c2468 85c0 751d 488b4c2460 }
            // n = 4, score = 100
            //   488b7c2468           | inc                 ebp
            //   85c0                 | xor                 ecx, ecx
            //   751d                 | xor                 edx, edx
            //   488b4c2460           | dec                 eax

        $sequence_3 = { ff15???????? cc 4883c9ff 418bc2 }
            // n = 4, score = 100
            //   ff15????????         |                     
            //   cc                   | dec                 esp
            //   4883c9ff             | mov                 esi, dword ptr [esp + 0x90]
            //   418bc2               | dec                 ebp

        $sequence_4 = { 4c8d842490000000 4533c9 f3a4 488d4c2450 498bd6 48894c2430 498bcc }
            // n = 7, score = 100
            //   4c8d842490000000     | mov                 ecx, edi
            //   4533c9               | dec                 ebp
            //   f3a4                 | cmp                 edi, esi
            //   488d4c2450           | jb                  0x7bd
            //   498bd6               | dec                 esp
            //   48894c2430           | lea                 ebx, [esp + 0x60]
            //   498bcc               | dec                 ecx

        $sequence_5 = { 6689445420 41ffc0 48ffc2 4883c9ff }
            // n = 4, score = 100
            //   6689445420           | cmp                 eax, -1
            //   41ffc0               | je                  0x228
            //   48ffc2               | dec                 eax
            //   4883c9ff             | mov                 ebx, eax

        $sequence_6 = { ff15???????? 4883f830 0f85b3000000 817c245000100000 }
            // n = 4, score = 100
            //   ff15????????         |                     
            //   4883f830             | lea                 ecx, [esp + 0x50]
            //   0f85b3000000         | dec                 esp
            //   817c245000100000     | lea                 ecx, [esp + 0x88]

        $sequence_7 = { c640eb04 458d5807 c640ec05 c640ed07 c640ee08 c640ef0a c640f00b }
            // n = 7, score = 100
            //   c640eb04             | lea                 eax, [edi - 0xf]
            //   458d5807             | cmp                 eax, 5
            //   c640ec05             | ja                  0x567
            //   c640ed07             | dec                 eax
            //   c640ee08             | test                edx, edx
            //   c640ef0a             | je                  0x567
            //   c640f00b             | cmp                 word ptr [edx], 0x3d

        $sequence_8 = { baeeeac01f 488bcb 4c8bf0 e8???????? 837e1000 }
            // n = 5, score = 100
            //   baeeeac01f           | dec                 eax
            //   488bcb               | mov                 ecx, edi
            //   4c8bf0               | dec                 eax
            //   e8????????           |                     
            //   837e1000             | mov                 dword ptr [esp + 0x28], ebx

        $sequence_9 = { 66897c2460 6644894c2462 66895c2464 ff15???????? 488bf0 4885c0 0f84c0000000 }
            // n = 7, score = 100
            //   66897c2460           | mov                 edx, 0x74
            //   6644894c2462         | mov                 eax, 0x2d
            //   66895c2464           | mov                 word ptr [esp + 0x50], ax
            //   ff15????????         |                     
            //   488bf0               | mov                 eax, 0x6b
            //   4885c0               | xor                 ebx, ebx
            //   0f84c0000000         | mov                 word ptr [esp + edx*2 + 0x20], ax

    condition:
        7 of them and filesize < 50176
}
Download all Yara Rules