Monday, May 19, 2025
HomeMalwareBrazilian Banking Trojan Allows Attackers Hijack Victims Bank Account and Send Himself...

Brazilian Banking Trojan Allows Attackers Hijack Victims Bank Account and Send Himself Victims Funds

Published on

SIEM as a Service

Follow Us on Google News

Brazilian Banking Trojan Which Delivering under the name vm.png through Spam Email campaigns, allows attackers to Hijack victim devices and attackers send himself Victims Funds.

An old banking fraud toolkit first discovered by IBM Trusteer in January 2015 has reared its ugly head again, this time in the form of a trojan called Boleto which uses overlay technique to dupe consumers of their banking details and even money.

The user-friendly Trojan is available in the Brazilian black market and can be used by hackers with minimal technical skills but is almost as deadly as some of the popular tools like Trickbot or those offered by Zeus.

- Advertisement - Google News

While the aforementioned tools use phishing attacks, Boleto uses malware sent through email attachments to install Java code using a JAR file.

Also Read : Sockbot Android Malware Found in Eight Apps on Google Play with 2.6 million Installations

How This  Banking Trojan works

Upon opening a malicious mail infected by the malware, the user is forced to install Java code using a JAR file.

The JAR file contains an executable VMware file called vprintproxy.exe(hidden under a png file) which is a legitimate file signed by VMware.

Using DLL hijacking techniques the malicious code is then stored in vmwarebase.dll, thus going under the scanner of an anti-virus or anti-malware scanner.

Malware Working Function

Once in, as most malware do, it waits and bides its time till the end user logs into his/her banking site.

Once logged in, the malware sends an SMS to the remote attacker and a pop-ups an authentic looking overlay screen on top the user’s browser.

  • Keylogger
  • Screenshots
  • Replacing current screen with a provided image
  • Changing current system cursor
  • Autorun registry persistence establishment
  • Shutting down system utilities (such as taskmgr, dwm, regedit etc.)
  • Invoking system reboot
  • File\dir deletion functions

The Malware Module Interconnection:

The purpose of the overlay is to distract the user while underneath the overlay, the attacker makes merry with the logged in user information and conduct transactions as his/her will usually involving transferring money, stealing information etc.

This Trojan Kill some unwanted Process such as taskmgr.exe,msconfig.exe, regedit.exe, ccleaner.exe / ccleaner64.exe, dwm.exe (for Windows 7 only) iexplore.exe,iexplore.exe,iexplore.exe, firefox.exe,chrome.exe, opera.exe, opera.exe,safari.exe, NetExpress50.exe AplicativoBradesco.exe

Due to its sheer brilliance, stopping this fraud would require in addition to updated signature patterns for an anti-malware scanner, detection of remote access tools, checking for out of the ordinary browser behaviors.

The end user has to be educated on how to deal with the threat with the onus lying on the banks also to educate and inform the users that should such overlays happen during a logged in session, to immediately log out and alert the relevant authorities.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials

A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom...

New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection

A newly identified piece of malware, dubbed the "Hannibal Stealer," has emerged as a...

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives

Advanced persistent threat (APT) groups with ties to China have become persistent players in...

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base

Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection

A newly identified piece of malware, dubbed the "Hannibal Stealer," has emerged as a...

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

Skitnet Malware Employs Stealth Techniques to Execute Payload and Maintain Persistence Techniques

A new and highly sophisticated multi-stage malware, known as Skitnet (or Bossnet), has been...