Name | Description |
---|---|
FIENDCRY |
The FIENDCRY component is a memory scraper based on MemPDump that scans through process memory looking for regular expressions. Its stage 1 component scans all processes, and its stage 2 component targets a specific process of interest. [4] [6] [5] |
DUEBREW |
The DUEBREW component is a Perl2Exe binary launcher. [4] [5] |
DRIFTWOOD |
The DRIFTWOOD component is a Perl2Exe compiled Perl script used by G0053 after they have identified data of interest on victims. [4] [5] |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1560 | .003 | Archive Collected Data: Archive via Custom Method |
RawPOS encodes credit card data it collected from the victim with XOR.[2][4][3] |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
RawPOS installs itself as a service to maintain persistence.[1][2][4] |
Enterprise | T1005 | Data from Local System |
RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.[1][2][4] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
Data captured by RawPOS is placed in a temporary file under a directory named "memdump".[1] |
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
New services created by RawPOS are made to appear like legitimate Windows services, with names such as "Windows Management Help Service", "Microsoft Support", and "Windows Advanced Task Manager".[1][2][4] |
ID | Name | References |
---|---|---|
G0053 | FIN5 |