June 6, 2023

Researchers discovered a banking trojan called Mispadu, which is getting used in several spam campaigns targeting victims in Latin America – Chile, Mexico, Peru, and Portugal.

The findings, which show 90,518 credentials stolen from a total of 17,595 unique websites, includes several government websites: 105 in Chile, 431 in Mexico and 265 in Peru.

The upgraded version of the Mispadu banking Trojan comes with a new backdoor programmed using Rust that  still bypasses endpoint protection tools, but the infection rate is low.

Advertisements

Mispadu features new techniques to facilitate infection and maintain persistence. These include fake certificates to obfuscate initial stage malware and a new .NET-based backdoor enabling screenshots of target victims, as well as the sending of phony pop-up windows to prompt them to click on specific links.

Mispadu TTP is like other banking trojans targeting the region, like Grandoreiro, Javali, and Lampion. Attack chains involving the Delphi malware leverage email messages urging recipients to open fake overdue invoices, thereby triggering a multi-stage infection process.

Modus of Operandi

  • Once after the victim open the HTML attachment sent via the spam email, it verifies that the file was opened from a desktop device and then redirects to a remote server to fetch the first-stage malware.
  • The RAR or ZIP archive, is designed to make use of rogue digital certificates – one which is the Mispadu malware and the other, an AutoIT installer – to decode and execute the trojan by abusing the legitimate certutil command-line utility.

The report concludes stating Organizations need to assume that sooner or later an employee will be compromised, and therefore, work on a strategy that can help to reduce the time to detect and respond to these threats while improving SOC’s monitoring, detection, and response capabilities.

Advertisements

This research was documented by researchers from Metabase Q

Indicators of Compromise

  • 3486F6F21034A33C5425A398839DE80AC88FECA8
  • 1D19191FB2E9DED396B6352CBF5A6746193D05E8
  • 22E6EBDFAB7C2B07FF8748AFE264737C8260E81E
  • 63DCBE2DB9CC14564EB84D5E953F2F9F5C54ACD9
  • 8B950BF660AA7B5FB619E1F6E665D348BF56C86A
  • F6021380AD6E26038B5629189A7ADA5E0022C313
  • 76F70276EB95FFEC876010211B7198BCBC460646

Leave a Reply

%d bloggers like this: