Research

Brazilian Bankers Gone Wild: Now Using Malicious Office Files

New trick from cybercriminals of Brazil – a suspicious message arrives to the user with a file attached named “Comprovante_Internet_Banking.rtf”, translated from Portuguese it means “Receipt from Internet Banking”:

Are you waiting a banking receipt via email?

If the user were to open the file it would be presented with the image of a bank receipt and the invitation to double click on it (the text below says “Click to see in a larger size”, “To display the banking receipt click twice in the image”)

When clicking on the embedded object the the user will be asked to execute it starting the infection process by running a CPL file

The .RTF file format and some text editors allow the insertion of file objects inside documents, interestingly even an executable file can be embedded:

The .RTF file has 2 blocks of binary data:
object size 223753 at index 000000D5
object size 15744 at index 00070215
One of them which reveals the path used by the bad guy to create the image, revealing ownership of an Acer Aspire-4520 computer:

The .CPL file (MD5: 563707b4edcc0bb0c88365a6702d4ba0) embedded into the RTF file is a well-known Brazilian Trojan banker, written in Delphi, belonging to the family Trojan.Win32.ChePro – after executed it drops several files through the system to keep the infection running. Embedding malicious files into RTF or DOC files allows cybercriminals to bypass e-mail filtering by extensions or type; also it allows them to break the AV detection by signatures.

We are sure that we’ll see this technique being exploited in Brazil more times from now on.

Brazilian Bankers Gone Wild: Now Using Malicious Office Files

Your email address will not be published. Required fields are marked *

 

Reports

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox