Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-06 00:17:29 UTC Home > List all groups > List all tools > List all groups using tool Decebal Tool: Decebal Names Decebal Category Malware Type POS malware, Reconnaissance, Credential stealer Description (Trend Micro) Decebal refers to a PoS RAM scraper malware family first discovered at the beginning of 2014. Decebal is unique in that it is coded in VBScript and is compiled into an executable file. Most PoS RAM scrapers are coded in C, C++, or Delphi. Like BlackPOS, Decebal’s source code was also leaked online. Decebal comes with many existing functionality found in established and even new PoS RAM scraper malware families Information Malpedia Last change to this tool card: 25 May 2020 Download this tool card in JSON format All groups using tool Decebal Changed Name Country Observed Unknown groups   _[ Interesting malware not linked to an actor yet ]_   1 group listed (0 APT, 0 other, 1 unknown) https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=18271da6-eda0-464d-8a94-caae5f0168a6 Page 1 of 2 Source: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=18271da6-eda0-464d-8a94-caae5f0168a6 https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=18271da6-eda0-464d-8a94-caae5f0168a6 Page 2 of 2 Unknown groups _[ Interesting malware not linked to an actor yet ]_ 1 group listed (0 APT, 0 other, 1 unknown) Page 1 of 2