ATM-Jackpotting P4WNP1-style With Malware XFS - DIRECT: Frank Boldewin (@r3c0nst)
ATM-Jackpotting P4WNP1-style With Malware XFS - DIRECT: Frank Boldewin (@r3c0nst)
P4WNP1’s original Mainhandler written in Python was adjusted by the perpetrators to inject the ATM malware.
The final payload (decimal ASCII text containing the ATM-Malware) gets loaded, transformed to a
binary blob and passed to the Invoke-ReflectivePEInjection routine inside “Invoke_Module.txt “
Until 18th October 2019 these samples haven’t been emerged on Virustotal.
At start XFS_DIRECT disables all network adapters to prevent alarms being send to the bank’s datacenter.
When exiting network adapters are reenabled again.
ATM-Jackpotting P4WNP1-style with malware XFS_DIRECT
11
XFS_DIRECT under the hood (2/2)
Dispenser (CDM) XFS function calls PINPAD (EPP) XFS function calls
https://github.com/mame82/P4wnP1/blob/master/DISCLAIMER.md