Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Metamorfo

Metamorfo

Metamorfo is a Latin-American banking trojan operated by a Brazilian cybercrime group that has been active since at least April 2018. The group focuses on targeting banks and cryptocurrency services in Brazil and Mexico.[1][2]

ID: S0455
Associated Software: Casbaneiro
Type: MALWARE
Platforms: Windows
Contributors: Jose Luis Sánchez Martinez; Chen Erlich, @chen_erlich, enSilo
Version: 2.1
Created: 26 May 2020
Last Modified: 11 April 2024

Associated Software Descriptions

NameDescription
Casbaneiro

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Metamorfo has used HTTP for C2.[1][2]

EnterpriseT1010Application Window Discovery

Metamorfo can enumerate all windows on the victim’s machine.[3][4]

EnterpriseT1119Automated Collection

Metamorfo has automatically collected mouse clicks, continuous screenshots on the machine, and set timers to collect the contents of the clipboard and website browsing.[3]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Metamorfo has configured persistence to the Registry keyHKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.[1][3][4][2]

EnterpriseT1115Clipboard Data

Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.[4][2]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Metamorfo has usedcmd.exe /c to execute files.[1]

.005Command and Scripting Interpreter:Visual Basic

Metamorfo has used VBS code on victims’ systems.[3]

.007Command and Scripting Interpreter:JavaScript

Metamorfo includes payloads written in JavaScript.[1]

EnterpriseT1565.002Data Manipulation:Transmitted Data Manipulation

Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address.[4][2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Upon execution,Metamorfo has unzipped itself after being downloaded to the system and has performed string decryption.[1][3][2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Metamorfo has encrypted C2 commands with AES-256.[2]

.002Encrypted Channel:Asymmetric Cryptography

Metamorfo's C2 communication has been encrypted using OpenSSL.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Metamorfo can send the data it collects to the C2 server.[2]

EnterpriseT1083File and Directory Discovery

Metamorfo has searched the Program Files directories for specific folders and has searched for strings related to its mutexes.[1][4][3]

EnterpriseT1564.003Hide Artifacts:Hidden Window

Metamorfo has hidden its GUI using the ShowWindow() WINAPI call.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

Metamorfo has side-loaded its malicious DLL file.[1][3][2]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.[1][3]

EnterpriseT1070Indicator Removal

Metamorfo has a command to delete a Registry key it uses,\Software\Microsoft\Internet Explorer\notes.[3]

.004File Deletion

Metamorfo has deleted itself from the system after execution.[1][4]

EnterpriseT1105Ingress Tool Transfer

Metamorfo has used MSI files to download additional files to execute.[1][3][4][2]

EnterpriseT1056.001Input Capture:Keylogging

Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.[4][2]

.002Input Capture:GUI Input Capture

Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.[3]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer and has masqueraded payloads as OneDrive, WhatsApp, or Spotify, for example.[1][2]

EnterpriseT1112Modify Registry

Metamorfo has written process names to the Registry, disabled IE browser features, deleted Registry keys, and changed the ExtendedUIHoverTime key.[1][4][3][2]

EnterpriseT1106Native API

Metamorfo has used native WINAPI calls.[1][4]

EnterpriseT1095Non-Application Layer Protocol

Metamorfo has used raw TCP for C2.[3]

EnterpriseT1571Non-Standard Port

Metamorfo has communicated with hosts over raw TCP on port 9999.[3]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

Metamorfo has used VMProtect to pack and protect files.[4]

.013Obfuscated Files or Information:Encrypted/Encoded File

Metamorfo has encrypted payloads and strings.[1][2]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Metamorfo has been delivered to victims via emails with malicious HTML attachments.[3][2]

EnterpriseT1057Process Discovery

Metamorfo has performed process name checks and has monitored applications.[1]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe).[1]

EnterpriseT1113Screen Capture

Metamorfo can collect screenshots of the victim’s machine.[3][2]

EnterpriseT1129Shared Modules

Metamorfo had used AutoIt to load and execute the DLL payload.[4]

EnterpriseT1518Software Discovery

Metamorfo has searched the compromised system for banking applications.[3][2]

.001Security Software Discovery

Metamorfo collects a list of installed antivirus software from the victim’s system.[4][2]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

Metamorfo has digitally signed executables using AVAST Software certificates.[1]

EnterpriseT1218.005System Binary Proxy Execution:Mshta

Metamorfo has used mshta.exe to execute a HTA payload.[3]

.007System Binary Proxy Execution:Msiexec

Metamorfo has used MsiExec.exe to automatically execute files.[4][2]

EnterpriseT1082System Information Discovery

Metamorfo has collected the hostname and operating system version from the compromised host.[3][4][2]

EnterpriseT1033System Owner/User Discovery

Metamorfo has collected the username from the victim's machine.[2]

EnterpriseT1124System Time Discovery

Metamorfo uses JavaScript to get the system time.[1]

EnterpriseT1204.002User Execution:Malicious File

Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.[3][2]

EnterpriseT1497Virtualization/Sandbox Evasion

Metamorfo has embedded a "vmdetect.exe" executable to identify virtual machines at the beginning of execution.[1]

EnterpriseT1102.001Web Service:Dead Drop Resolver

Metamorfo has used YouTube to store and hide C&C server domains.[2]

.003Web Service:One-Way Communication

Metamorfo has downloaded a zip file for execution on the system.[1][3][4]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp