Brazilian Trojan Bankers Now Digitally Signed

How easy is it for bad guys to buy valid digital certificates from CAs using fake data and then start signing Trojan bankers with them? In Brazil it appears to be very easy.

Today most software developers digitally sign their programs. The process involves Certification Authorities (CAs) that must verify the authenticity of the files and issue a certificate to the developers.

As we know, valid or stolen digital certificates are used by some malware authors to create files that can go undetected for some time and be recognized as legitimate. Now Brazilian cybercriminals have started using this technique in their malware in an attempt to gain more time to spread files undetected. Recently we found a Trojan banker signed with a valid digital certificate issued by a CA. It appears that fake company data was used to obtain the certificate.

How easy is it for a CA to check if the data they receive is legitimate or not? Brazilian cybercriminals registered a domain called, copying the name of a well-known and trusted local software company. This is the data used to register the domain:

The data is totally fake. The domain was registered using a free webmail (Yahoo). The address, in the beautiful city of Vitória, is for a residential build:

The telephone number used to register the domain is also fake; it’s not located in Vitória (where the area code is 27), but in Pernambuco state (area code 81). But even using the forged data in the registered domain, the criminals were able to buy digital certificates from Comodo, issued on 28 May, and valid until 29 May 2015:

After this easy step, they started signing their Trojans:

After a mass mailing campaign that requested Brazilian Internet banking users to install an “update”, some users were infected.

One of the Trojans, besides being digitally signed, used another trick that is common among malware authors: HP was mentioned in the file description in an attempt to trick users into believing it was a legitimate file.

The digital certificates were revoked by Comodo 15 days after being issued following an alert from a local security company. Kaspersky detects it as Trojan-Banker.Win32.Banbra.atfl.

Brazilian Trojan Bankers Now Digitally Signed

Your email address will not be published. Required fields are marked *



Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

APT trends report Q1 2021

This report highlights significant events related to advanced persistent threat (APT) activity observed in Q1 2021. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports.

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Subscribe to our weekly e-mails

The hottest research right in your inbox