Home / News / Mekotio banking trojan fakes security update, steals bitcoins and exfiltrates Google credentials
Latin American banking trojans.

Mekotio banking trojan fakes security update, steals bitcoins and exfiltrates Google credentials

ESET researchers are investigating a notorious Latin American banking trojans called Mekotio, targeting Spanish- and Portuguese-speaking countries: mainly Brazil, Chile, Mexico, Spain, Peru and Portugal.

This malware is known to take screenshots, restarting affected machines, restricting access to legitimate banking websites, and, in some cases, even stealing bitcoins and exfiltrating credentials stored by the Google Chrome browser.

Mekotio has been active since at least 2015 and as with other banking trojans ESET has investigated, shared common characteristics for this type of malware, such as being written in Delphi, using fake pop-up windows and containing backdoor functionality. To look less suspicious, Mekotio tries to impersonate a security update using a specific message box.

There are many technical details Mekotio is able to access from its victims, including information about the firewall configuration, administrator privileges, the Windows OS version, and a list of anti-fraud products and antimalware solutions installed. One command even tries to cripple the victim’s machine by attempting to remove all files and folders in the C:\Windows tree.

“For researchers, the most notable feature of the newest variants of this malware family is its use of an SQL database as a C&C server and how it abuses the legitimate AutoIt interpreter as its primary method of execution,” elaborates Robert Šuman, the ESET researcher leading the team of investigators focused on Mekotio.

The malware is predominantly distributed via spam. Since 2018, ESET researchers have observed 38 different distribution chains used by this family. Most of these chains consist of several stages and end up downloading a ZIP archive – a well-known behavior of Latin American banking trojans.

“Mekotio has followed a rather chaotic development path, with its features being continually modified. Based on its internal versioning, ESET believes there are multiple variants being developed simultaneously,” adds Šuman.

Read the latest edition of PCR’s monthly magazine below:

 

Like this content? Sign up for the free PCR Daily Digest email service to get the latest tech news straight to your inbox. You can also follow PCR on Twitter and Facebook.

 

Check Also

Data breach expert joins Keller Lenkner UK

Kingsley Hayes, data breach and cybercrime specialist, has joined Keller Lenkner UK as head of …