Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Mispadu

Mispadu

Mispadu is a banking trojan written in Delphi that was first observed in 2019 and uses a Malware-as-a-Service (MaaS) business model.[1][2] This malware is operated, managed, and sold by theMalteiro cybercriminal group.[2]Mispadu has mainly been used to target victims in Brazil and Mexico, and has also had confirmed operations throughout Latin America and Europe.[2][3][4]

ID: S1122
Type: MALWARE
Platforms: Windows
Contributors: SCILabs
Version: 1.0
Created: 13 March 2024
Last Modified: 18 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Mispadu creates a link in the startup folder for persistence.[1]Mispadu adds persistence via the registry keyHKCU\Software\Microsoft\Windows\CurrentVersion\Run.[5]

EnterpriseT1217Browser Information Discovery

Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[4][2]

EnterpriseT1115Clipboard Data

Mispadu has the ability to capture and replace Bitcoin wallet data in the clipboard on a compromised host.[1]

EnterpriseT1059.005Command and Scripting Interpreter:Visual Basic

Mispadu’s dropper uses VBS files to install payloads and perform execution.[2][1]

EnterpriseT1555Credentials from Password Stores

Mispadu has obtained credentials from mail clients via NirSoft MailPassView.[2][4][1]

.003Credentials from Web Browsers

Mispadu can steal credentials from Google Chrome.[2][1][5]

EnterpriseT1140Deobfuscate/Decode Files or Information

Mispadu decrypts its encrypted configuration files prior to execution.[2][1]

EnterpriseT1573.002Encrypted Channel:Asymmetric Cryptography

Mispadu contains a copy of the OpenSSL library to encrypt C2 traffic.[4]

EnterpriseT1041Exfiltration Over C2 Channel

Mispadu can sends the collected financial data to the C2 server.[1][2]

EnterpriseT1083File and Directory Discovery

Mispadu searches for various filesystem paths to determine what banking applications are installed on the victim’s machine.[1]

EnterpriseT1056.001Input Capture:Keylogging

Mispadu can log keystrokes on the victim's machine.[1][5][3]

.002Input Capture:GUI Input Capture

Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[4][2]

EnterpriseT1106Native API

Mispadu has used a variety of Windows API calls, including ShellExecute and WriteProcessMemory.[4][2]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

Mispadu uses a custom algorithm to obfuscate its internal strings and uses hardcoded keys.[1]

Mispadu also uses encoded configuration files and has encoded payloads using Base64.[1][2][6]

EnterpriseT1566.002Phishing:Spearphishing Link

Mispadu has been spread via malicious links embedded in emails.[2]

EnterpriseT1057Process Discovery

Mispadu can enumerate the running processes on a compromised host.[1]

EnterpriseT1055Process Injection

Mispadu's binary is injected into memory viaWriteProcessMemory.[4][2]

EnterpriseT1113Screen Capture

Mispadu has the ability to capture screenshots on compromised hosts.[2][3][1][5]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Mispadu can list installed security products in the victim’s environment.[1][5]

EnterpriseT1176.001Software Extensions:Browser Extensions

Mispadu utilizes malicious Google Chrome browser extensions to steal financial data.[1]

EnterpriseT1218.007System Binary Proxy Execution:Msiexec

Mispadu has been installed via MSI installer.[2][1]

.011System Binary Proxy Execution:Rundll32

Mispadu uses RunDLL32 for execution via its injector DLL.[1]

EnterpriseT1082System Information Discovery

Mispadu collects the OS version, computer name, and language ID.[1]

EnterpriseT1614.001System Location Discovery:System Language Discovery

Mispadu checks and will terminate execution if the compromised system’s language ID is not Spanish or Portuguese.[4][2]

EnterpriseT1204.002User Execution:Malicious File

Mispadu has relied on users to execute malicious files in order to gain execution on victim machines.[1][5][2]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

Mispadu can run checks to verify if it is running within a virtualized environments including Hyper-V, VirtualBox or VMWare and will terminate execution if the computer name is "JOHN-PC."[1][2]

Groups That Use This Software

IDNameReferences
G1026Malteiro

[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp