![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPokopv5RjEOg5kNTyWwzHVZP6-Hffn-qxW3a60upbK9ctYy5aBDqlBESmXl0sls3ngV1_nu7u8ae1S6RZvItO5Yn0HeNv6J47iwzXUlVURsIWpLjTZd1_VQGg-2u9NeGvUTM-yMe5BPO8GT8R2WptKJGhOcc6Jk0Mc2y3KLsWkxZlJOD49vtVi_iDpFB_/s728-rw-e365/trojan.png)
Brazil’s Windows users are the target of a campaign that provides banks, known as Coyote.
“Once it is deployed, the Koyote Banking Trojan horses can run various malicious activities, including key logs, screenshots captures, and phishing overlays.
Cyber Security has found some Windows shortcuts (LNK) file artifacts, including the PowerShell commands in charge of distribution of malware for the past month.
![Cyber security](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg)
Coyote was first recorded by Kaspersky in early 2024 and detailed attacks targeting users in Southern America. You can harvest sensitive information from more than 70 financial applications.
Previous attack chains, which were documented by Russian cyber security companies, triggers a resinstaller executable file and triggers an electronic and compiled nodes. 。
On the other hand, the latest infection sequence starts with an LNK file that runs the PowerShell command and gets the following steps from the remote server (“tbet.geontrigame)[.]Com “) Another PowerShell script that launches a loader in charge of execution of the provisional payload.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdhpjdQ3-D4hgG5J6KDvT7eqoKB0-cfiyObhXK1AwUOA6869tzVtT0O3S0oJbPGIvi6JjDQjd3IwZetPGyVk9tnNzrVvLoKbtNaxp3G4Ge8lQTd2uaArkpnq3DefLhMoQTfBaA7kpy35NEMAT5Hl6aoca3A9ZGp7xIj4VEbcRSMasORDiBTzyc-aF9bNsu/s728-rw-e365/powershell.png)
“The injected code will leverage the donut, a tool designed to decrypt and execute the final Msil (Microsoft International Language) payload,” Lin said. The decrypted MSIL execution file is first established by changing the registry in “HCKU \ Software \ Microsoft \ Windows \ CurrentVersion \ Run”. “
“If found, delete the existing entry and create a new entry with randomly generated names. This new registry entry refers to downloading and executing the Base64 encoding URL. Included.
When the malware is launched, the list of the basic system information and the list of virus measures installed on the host, then the data is Base64 encoded and excluded to the remote server. Also, perform various checks to avoid detection by sandboxes and virtual environments.
![Cyber security](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png)
Notable changes in coyote’s latest itelation include 73 financial agents, including 1,030 sites and 73 financial agents such as MercadoBitCoin.com.Br, BitCointrade.com.BR, Foxbit.com.BR, and Augustostel.com.BR. It is to extend it like. , BlumenhotelBoutique.com.b, and Fallshotel.com.B.
If the victim tries to access one of the sites in the list, the malware will contact the attacker control server and determine the next action course from screenshot capture to overlay. Other functions include key logger activation and display settings.
“The coyote infection process is complicated and multi -stage,” Lin said. “This attack has leveraged LNK files for initial access, and has led to the discovery of other malicious files. This Trojan horses can be expanded beyond the initial target. It has a great threat to financial cyber security.
Source link