A new banking trojan, initially called ‘Matrix Banker’, has been spotted currently targeting Latin America — or more specifically, Mexico and Peru. It seems to be still under development, and for now the jury is out over whether it will become a long-term threat.
In a quick analysis, serving more as early notification of its existence than a detailed technical analysis, Arbor Networks has posted a new report on a version compiled as recently as May 26, 2017.
The initial loader for Matrix Banker sets persistence through Registry Run, and extracts and injects a DLL into Chrome, Firefox, Internet Explorer or Edge. The DLL hooks the relevant browser functions to establish the man-in-the-browser (MitB). The malware then phones home to its C2 server to get the webinject config.
“Responses from the C2 are hex encoded and encrypted using the Salsa20 crypto algorithm,” notes Dennis Schwarz,
Sr. malware research analyst at Arbor. “This is the first malware family that we’ve seen that uses this algorithm.” Salsa20 is an unpatented stream cipher developed by Daniel Bernstein. The Petya ransomware has always used Salsa20 to encrypt its victims’ Master File Table.
The Matrix Banker author’s willingness and ability to employ unusual encryption contrasts with the current state of the malware’s webinject. “While functional, the webinject format looks to be under construction,” comments Schwarz. “Earlier samples use a different, simpler format and there is plenty of work to do to catch up with the industry standard Zeus webinjects.” At the same time, the malware uses the more difficult but more recent and potentially more effective method of redirection to a phishing page.
It was reported that the established and technically competent Gootkit banking trojan only moved to the redirection approach earlier this year. The ultimate success or failure of the redirect approach depends on the ‘quality’ of the false landing page. The better it is, the more likely is the user to enter his bank credentials. With Matrix Banker, Schwarz told SecurityWeek, “Visually, it looks like an exact copy of the targeted financial institution’s login page.”
It is contradictions like these within the code that makes Arbor Networks believe the malware is still under development, and that it is too early yet to predict whether Matrix Banker will last the course. Nevertheless, it is in the wild and being used to target banks in Mexico and Peru.
Distribution is currently by botnet. “So far, we can trace it back to being dropped by another malware known as Beta Bot, which has been around for a long time,” said Schwarz. “The associated Beta Bot samples are also being distributed via what looks like legitimate, but hacked sites with files like: Estado_Cuenta 29-05-2017.exe and CFE_Factura 30-05-2017.exe.”
“It is too soon to assess how active and widespread this new family will become,” says Arbor, “but it is actively being developed and targeting financial institutions in the wild.”