Grandoreiro is a multi-component banking trojan likely operated as Malware-as-a-Service (MaaS) with major updates to string decryption and domain generation, plus new capabilities to use Microsoft Outlook on infected hosts to spread phishing. IBM X-Force reports global campaigns targeting over 1500 banks in over 60 countries, impersonating government entities in LATAM and beyond, signaling a broader deployment strategy following law enforcement actions. #Grandoreiro #XForce #Outlook #SARS #SAT #CFE #DGA #MalwareAsAService
Keypoints
- Grandoreiro is a multi-component banking trojan likely operated as Malware-as-a-Service (MaaS).
- Campaigns impersonate government entities in Mexico, Argentina, and South Africa to deliver the malware.
- Targets include over 1500 global banking apps/websites across 60 countries (LATAM, Africa, Europe, Indo-Pacific).
- New variant introduces major updates to string decryption and domain generation (DGA), enabling multiple C2 domains per day.
- Loader can harvest Outlook data and use the victim’s Outlook client to send phishing emails, expanding spread.
- Campaigns include a sophisticated infection chain (loader, decryption, C2, payload) with CAPTCHA to hinder automation.
MITRE Techniques
- [T1566.001] Spear Phishing Attachment – The initial attack vector involves phishing emails impersonating reputable organizations to distribute malicious attachments, tricking users into downloading the Grandoreiro banking trojan. ‘The initial attack vector involves phishing emails impersonating reputable organizations to distribute malicious attachments, tricking users into downloading the Grandoreiro banking trojan.’
- [T1036] Masquerading – The phishing emails and associated payloads often mimic legitimate entities and services, utilizing disguised files that appear to be innocuous documents, such as PDFs, to conceal malicious intent. ‘phishing emails and associated payloads often mimic legitimate entities and services, utilizing disguised files that appear to be innocuous documents, such as PDFs, to conceal malicious intent.’
- [T1173] Dynamic Data Exchange – While not explicitly mentioned, techniques similar to Dynamic Data Exchange could be employed to execute malicious scripts via Microsoft Outlook, which Grandoreiro manipulates to propagate further phishing emails. ‘While not explicitly mentioned, techniques similar to Dynamic Data Exchange could be employed to execute malicious scripts via Microsoft Outlook, which Grandoreiro manipulates to propagate further phishing emails.’
- [T1027] Obfuscated Files or Information – The malware uses various obfuscation techniques, including triple-Base64 encoding and custom encryption algorithms, to hide its malicious strings and commands, complicating analysis and detection. ‘The malware uses various obfuscation techniques, including triple-Base64 encoding and custom encryption algorithms, to hide its malicious strings and commands, complicating analysis and detection.’
- [T1071] Command and Control – Grandoreiro communicates with its command and control (C2) servers, dynamically generated through a sophisticated Domain Generation Algorithm (DGA), enabling consistent control over the malware despite potential disruptions in the C2 infrastructure. ‘Grandoreiro communicates with its command and control (C2) servers, dynamically generated through a sophisticated Domain Generation Algorithm (DGA)…’
- [T1496] Resource Hijacking – The malware hijacks the Microsoft Outlook client on infected hosts to send out further phishing campaigns, exploiting the victim’s resources and trusted status to propagate the infection. ‘The malware hijacks the Microsoft Outlook client on infected hosts to send out further phishing campaigns, exploiting the victim’s resources and trusted status to propagate the infection.’
- [T1027.002] Software Packing – The Grandoreiro payload is typically delivered within a packed executable that is significantly bloated to avoid automated analysis and detection by antivirus programs. ‘The Grandoreiro payload is typically delivered within a packed executable that is significantly bloated to avoid automated analysis and detection by antivirus programs.’
- [T1056] Credential Access – By targeting over 1500 banking applications and websites globally, the malware likely employs methods to intercept or harvest credentials directly from the victim’s interactions with these financial platforms. ‘By targeting over 1500 banking applications and websites globally, the malware likely employs methods to intercept or harvest credentials directly from the victim’s interactions with these financial platforms.’
Indicators of Compromise
- [Email Address] – LATAM and other regions observed: [email protected], [email protected], [email protected]., [email protected], [email protected], [email protected]
- [URL] – Malicious download links: https://pjohconstruccionescpaz.com/?8205-23069071&tokenValue=92b768ccface4e96cee662517800b208f88ff796, https://hilcfacdigitaelpichipt.norwayeast.cloudapp.azure.com/?docs/pdf/15540f02-d006-4e3b-b2de-6873baff3b2a, https://officebusinessaccount.eastus.cloudapp.azure.com/?PDF-XML-, https://servicerevenueza.southeastasia.cloudapp.azure.com/?PDF-XML-71348793
- [SHA256] – 97f3c0beef87b993be321b5af3bf748cc8e003e6e90cf5febf69dfd81e85f581, afd53240a591daf50f556ca952278cf098dbc5b6c2b16c3e46ab5a0b167afb40, 3f920619470488b8c1fda4bb82803f72205b18b1ea31402b461a0b8fe737d6bd, 70f22917ec1fa3a764e21f16d68af80b697fb9d0eb4f9cd6537393b622906908
- [IPv4] – 18.231.181.227, 18.231.158.159, 15.229.211.175, 15.228.245.103
Read more: https://securityintelligence.com/x-force/grandoreiro-banking-trojan-unleashed/