Lucene search

K
thnThe Hacker NewsTHN:F63B6ED1F93E35E81766719439C3BA3D
HistoryJul 10, 2023 - 12:22 p.m.

New TOITOIN Banking Trojan Targeting Latin American Businesses

2023-07-1012:22:00
The Hacker News
thehackernews.com
34
toitoin banking trojan
latin american businesses
multi-stage infection
phishing email
zip archive
evasion techniques
malicious activities
system manipulation
elevated privileges

0.135 Low

EPSS

Percentile

95.6%

TOITOIN Banking Trojan

Businesses operating in the Latin American (LATAM) region are the target of a new Windows-based banking trojan called TOITOIN since May 2023.

β€œThis sophisticated campaign employs a trojan that follows a multi-staged infection chain, utilizing specially crafted modules throughout each stage,” Zscaler researchers Niraj Shivtarkar and Preet Kamal said in a report published last week.

β€œThese modules are custom designed to carry out malicious activities, such as injecting harmful code into remote processes, circumventing User Account Control via COM Elevation Moniker, and evading detection by Sandboxes through clever techniques like system reboots and parent process checks.”

The six-stage endeavor has all the hallmarks of a well-crafted attack sequence, beginning with a phishing email containing an embedded link that points to a ZIP archive hosted on an Amazon EC2 instance to evade domain-based detections.

The email messages leverage an invoice-themed lure to trick unwitting recipients into opening them, thereby activating the infection. Within the ZIP archive is a downloader executable that’s engineered to set up persistence by means of an LNK file in the Windows Startup folder and communicate with a remote server to retrieve six next-stage payloads in the form of MP3 files.

The downloader is also responsible for generating a Batch script that restarts the system after a 10-second timeout. This is done so as to β€œevade sandbox detection since the malicious actions occur only after the reboot,” the researchers said.

Included among the fetched payloads is β€œicepdfeditor.exe,” a valid signed binary by ZOHO Corporation Private Limited, which, when executed, sideloads a rogue DLL (β€œffmpeg.dll”) codenamed the Krita Loader.

The loader, for its part, is designed to decode a JPG file downloaded alongside the other payloads and launch another executable known as the InjectorDLL module that reverses a second JPG file to form what’s called the ElevateInjectorDLL module.

The InjectorDLL component subsequently moves to inject ElevateInjectorDLL into the β€œexplorer.exe” process, following which a User Account Control (UAC) bypass is carried out, if required, to elevate the process privileges and the TOITOIN Trojan is decrypted and injected into the β€œsvchost.exe” process.

UPCOMING WEBINAR

[πŸ” Privileged Access Management: Learn How to Conquer Key Challenges

](<https://thn.news/pam-webinar&gt;)

Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.

Reserve Your Spot

β€œThis technique allows the malware to manipulate system files and execute commands with elevated privileges, facilitating further malicious activities,” the researchers explained.

TOITOIN comes with capabilities to gather system information as well as harvest data from installed web browsers such as Google Chrome, Microsoft Edge and Internet Explorer, Mozilla Firefox, and Opera. Furthermore, it checks for the presence of Topaz Online Fraud Detection (OFD), an anti-fraud module integrated into banking platforms in the LATAM region.

The nature of the responses from the command-and-control (C2) server is presently not known due to the fact that the server is no longer available.

β€œThrough deceptive phishing emails, intricate redirect mechanisms, and domain diversification, the threat actors successfully deliver their malicious payload,” the researchers said. β€œThe multi-staged infection chain observed in this campaign involves the use of custom-developed modules that employ various evasion techniques and encryption methods.”

Found this article interesting? Follow us on Twitter ο‚™ and LinkedIn to read more exclusive content we post.