Metamorfo

Metamorfo is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.[1][2]

ID: S0455
Associated Software: Casbaneiro
Type: MALWARE
Platforms: Windows
Contributors: Jose Luis Sánchez Martinez; Chen Erlich, @chen_erlich, enSilo
Version: 2.1
Created: 26 May 2020
Last Modified: 11 April 2024

Associated Software Descriptions

Name Description
Casbaneiro

[2]

Techniques Used

Domain ID Name Use
Enterprise T1036 .005 伪装: Match Legitimate Name or Location

Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.[1][2]

Enterprise T1112 修改注册表

Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.[1][3][4][2]

Enterprise T1129 共享模块

Metamorfo had used AutoIt to load and execute the DLL payload.[3]

Enterprise T1115 剪贴板数据

Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.[3][2]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

Metamorfo has encrypted C2 commands with AES-256.[2]

.002 加密通道: Asymmetric Cryptography

Metamorfo's C2 communication has been encrypted using OpenSSL.[1]

Enterprise T1574 .002 劫持执行流: DLL Side-Loading

Metamorfo has side-loaded its malicious DLL file.[1][4][2]

Enterprise T1140 反混淆/解码文件或信息

Upon execution, Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.[1][4][2]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Metamorfo has configured persistence to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.[1][4][3][2]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Metamorfo has used cmd.exe /c to execute files.[1]

.005 命令与脚本解释器: Visual Basic

Metamorfo has used VBS code on victims’ systems.[4]

.007 命令与脚本解释器: JavaScript

Metamorfo includes payloads written in JavaScript.[1]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.[1][4]

Enterprise T1113 屏幕捕获

Metamorfo can collect screenshots of the victim’s machine.[4][2]

Enterprise T1071 .001 应用层协议: Web Protocols

Metamorfo has used HTTP for C2.[1][2]

Enterprise T1010 应用窗口发现

Metamorfo can enumerate all windows on the victim’s machine.[4][3]

Enterprise T1565 .002 数据操控: Transmitted Data Manipulation

Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address.[3][2]

Enterprise T1083 文件和目录发现

Metamorfo has searched the Program Files directories for specific folders and has searched for strings related to its mutexes.[1][3][4]

Enterprise T1106 本机API

Metamorfo has used native WINAPI calls.[1][3]

Enterprise T1027 .002 混淆文件或信息: Software Packing

Metamorfo has used VMProtect to pack and protect files.[3]

.013 混淆文件或信息: Encrypted/Encoded File

Metamorfo has encrypted payloads and strings.[1][2]

Enterprise T1204 .002 用户执行: Malicious File

Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.[4][2]

Enterprise T1070 移除指标

Metamorfo has a command to delete a Registry key it uses, \Software\Microsoft\Internet Explorer\notes.[4]

.004 File Deletion

Metamorfo has deleted itself from the system after execution.[1][3]

Enterprise T1218 .005 系统二进制代理执行: Mshta

Metamorfo has used mshta.exe to execute a HTA payload.[4]

.007 系统二进制代理执行: Msiexec

Metamorfo has used MsiExec.exe to automatically execute files.[3][2]

Enterprise T1082 系统信息发现

Metamorfo has collected the hostname and operating system version from the compromised host.[4][3][2]

Enterprise T1033 系统所有者/用户发现

Metamorfo has collected the username from the victim's machine.[2]

Enterprise T1124 系统时间发现

Metamorfo uses JavaScript to get the system time.[1]

Enterprise T1102 .001 网络服务: Dead Drop Resolver

Metamorfo has used YouTube to store and hide C&C server domains.[2]

.003 网络服务: One-Way Communication

Metamorfo has downloaded a zip file for execution on the system.[1][4][3]

Enterprise T1119 自动化收集

Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.[4]

Enterprise T1497 虚拟化/沙盒规避

Metamorfo has embedded a "vmdetect.exe" executable to identify virtual machines at the beginning of execution.[1]

Enterprise T1518 软件发现

Metamorfo has searched the compromised system for banking applications.[4][2]

.001 Security Software Discovery

Metamorfo collects a list of installed antivirus software from the victim’s system.[3][2]

Enterprise T1105 输入工具传输

Metamorfo has used MSI files to download additional files to execute.[1][4][3][2]

Enterprise T1056 .001 输入捕获: Keylogging

Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.[3][2]

.002 输入捕获: GUI Input Capture

Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.[4]

Enterprise T1057 进程发现

Metamorfo has performed process name checks and has monitored applications.[1]

Enterprise T1055 .001 进程注入: Dynamic-link Library Injection

Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe).[1]

Enterprise T1041 通过C2信道渗出

Metamorfo can send the data it collects to the C2 server.[2]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Metamorfo has been delivered to victims via emails with malicious HTML attachments.[4][2]

Enterprise T1564 .003 隐藏伪装: Hidden Window

Metamorfo has hidden its GUI using the ShowWindow() WINAPI call.[1]

Enterprise T1095 非应用层协议

Metamorfo has used raw TCP for C2.[4]

Enterprise T1571 非标准端口

Metamorfo has communicated with hosts over raw TCP on port 9999.[4]

Enterprise T1553 .002 颠覆信任控制: Code Signing

Metamorfo has digitally signed executables using AVAST Software certificates.[1]

References