Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New “Matrix Banker” Trojan Targets Latin America

A new banking trojan, initially called ‘Matrix Banker’, has been spotted currently targeting Latin America — or more specifically, Mexico and Peru. It seems to be still under development, and for now the jury is out over whether it will become a long-term threat.

A new banking trojan, initially called ‘Matrix Banker’, has been spotted currently targeting Latin America — or more specifically, Mexico and Peru. It seems to be still under development, and for now the jury is out over whether it will become a long-term threat.

In a quick analysis, serving more as early notification of its existence than a detailed technical analysis, Arbor Networks has posted a new report on a version compiled as recently as May 26, 2017. 

The initial loader for Matrix Banker sets persistence through Registry Run, and extracts and injects a DLL into Chrome, Firefox, Internet Explorer or Edge. The DLL hooks the relevant browser functions to establish the man-in-the-browser (MitB). The malware then phones home to its C2 server to get the webinject config.

“Responses from the C2 are hex encoded and encrypted using the Salsa20 crypto algorithm,” notes Dennis Schwarz,

Sr. malware research analyst at Arbor. “This is the first malware family that we’ve seen that uses this algorithm.” Salsa20 is an unpatented stream cipher developed by Daniel Bernstein. The Petya ransomware has always used Salsa20 to encrypt its victims’ Master File Table.

The Matrix Banker author’s willingness and ability to employ unusual encryption contrasts with the current state of the malware’s webinject. “While functional, the webinject format looks to be under construction,” comments Schwarz. “Earlier samples use a different, simpler format and there is plenty of work to do to catch up with the industry standard Zeus webinjects.” At the same time, the malware uses the more difficult but more recent and potentially more effective method of redirection to a phishing page.

It was reported that the established and technically competent Gootkit banking trojan only moved to the redirection approach earlier this year. The ultimate success or failure of the redirect approach depends on the ‘quality’ of the false landing page. The better it is, the more likely is the user to enter his bank credentials. With Matrix Banker, Schwarz told SecurityWeek, “Visually, it looks like an exact copy of the targeted financial institution’s login page.”

It is contradictions like these within the code that makes Arbor Networks believe the malware is still under development, and that it is too early yet to predict whether Matrix Banker will last the course. Nevertheless, it is in the wild and being used to target banks in Mexico and Peru.

In the sample analyzed for this report, HTML and JavaScript code is used to redirect the user from the malware’s targeted financial institution to the developer’s copycat page hosted on “llinea[.]com”. “Hoping the victim doesn’t notice the redirect,” says the report, “the threat actor will harvest the victim’s banking credentials.”

Distribution is currently by botnet. “So far, we can trace it back to being dropped by another malware known as Beta Bot, which has been around for a long time,” said Schwarz. “The associated Beta Bot samples are also being distributed via what looks like legitimate, but hacked sites with files like: Estado_Cuenta 29-05-2017.exe and CFE_Factura 30-05-2017.exe.”

“It is too soon to assess how active and widespread this new family will become,” says Arbor, “but it is actively being developed and targeting financial institutions in the wild.”

Written By

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.

Cybercrime

Security researchers with Juniper Networks’ Threat Labs warn of a new Python-based backdoor targeting VMware ESXi virtualization servers.