

If somehow you ran across a sample listed here ❗ DO NOT EXECUTE IT ❗ consider yourself infected if you did. No download here, don't ask and move along, this is merely for information purposes only. You may want to have a look on presentation: MacGyver's return - An EMV Chip cloning case who basically explain "why?" and "how?" Who is this page NOT aimed at? Carders / Lamers: May hopefully someone find one or two useful gems, but i doubt (just my two cents, i already analyzed them and most of theses 'softs' are mostly copycat if not 'ressource hacked' of each others relying on GPShield and a 'macgyver.cap'. (HA and AR may return 404 error if they haven't already stumbled across the sample of interest.) There is before each hash a quick link access to their virustotal scan report, and also a hybrid-analysis and any.run link. If you are curious about how that kind of things work (how they handle smart cards, code similarities, etc.), you have here a list of +100 hashes to beggin your investigations.

I wasted a whole week-end building this list to see what look like the 'emv fraud landscape' for fun, and also to have a trace of which name correspond to which hash.


Hacktool:Win32/EMVSoft malware list Gallery with hashes of samples related to fraud softwares who aim to clone credit card datas on EMV chip.
