Alina (malware) explained

Alina is a Point of Sale Malware or POS RAM Scraper that is used by cybercriminals to scrape credit card and debit card information from the point of sale system.[1] It first started to scrape information in late 2012. It resembles JackPOS Malware.[2] [3]

Process of Alina POS RAM Scraper

Once executed, it gets installed on the user's computer and checks for updates. If an update is found, it removes the existing Alina code and installs the latest version. Then, for new installations, it adds the file path to an AutoStart runkey to maintain persistence. Finally, it adds java.exe to the %APPDATA% directory and executes it using the parameter alina=<path_to_executable> for new installations or, update=<orig_exe>;<new_exe> for upgrades.[4] [5]

Alina inspects the user's processes with the help of Windows API calls:

Alina maintains a blacklist of processes, if there is no process information in the blacklist it uses OpenProcess to read and process the contents in the memory dump. Once the data is scraped Alina sends it to C&C servers using an HTTP POST command that is hardcoded in binary.[6]

See also

Notes and References

  1. Web site: Alina POS malware "sparks" off a new variant. Trustwave.
  2. Web site: Researchers ID New Variant of Alina PoS Malware | SecurityWeek.Com. www.securityweek.com. 18 December 2014 .
  3. http://community.hpe.com/t5/Security-Research/Alina-POS-Malware/ba-p/6385271#.V2qUC_l96Uk Alina POS Malware
  4. Web site: PoS RAM Scraper Malware: Past, Present, and Future.
  5. Web site: PoS RAM Scraper Malware Mechanism . 2016-06-22 . 2016-08-10 . https://web.archive.org/web/20160810211300/http://blog.sisainfosec.com/2015/07/pos-malware-stealth-tool-to-steal.html . dead .
  6. Web site: Alina: Casting a Shadow on POS. Trustwave.