Zumanek Remote Access Trojan Threat Intel Advisory

CloudSEK Threat Intelligence Advisory on Zumanek Trojan, malware variant that hijacks bank accounts and steals crypto wallet credentials.
Updated on
April 19, 2023
Published on
October 22, 2020
Read MINUTES
5
Subscribe to the latest industry news, threats and resources.
Type
Trojan
Sector
Banking
  Zumanek is a malware categorized as a banking Remote Access Trojan (RAT). It was distributed in October 2020 targeting Latin American banking customers. This malware is distributed through social engineering. In this, cybercriminals use phishing tactics to trick users into downloading and installing Zumanek in their systems without their consent. The primary purpose of Zumanek is to steal bank accounts and crypto wallet credentials.  Currently, the trojan has targeted users mainly in Brazil. Also, dropper (the 'executable' which downloads Zumanek) checks the system's geolocation, and if it is not Brazil, the trojan is not downloaded. Since the motivation of the cybercriminals is purely financial, the hijacked bank accounts and crypto wallets are likely misused for fraudulent online purchases, account transfers, etc. Thus, this infection might lead to significant financial loss to the users.[/vc_wp_text][vc_wp_text]

Indicators of Compromise

Filename- 04042019071032osGBzySulM.bin MD5- 2c110060e1b90907dbf25e0f57e49740 SHA1- 76883946f89b9197a3e1a725658b821375f7b029 SHA256- 939f40b01e1fb0f3e7a2524154280cd92706de44fcec7ed8477754bf674f954f[/vc_wp_text][vc_wp_text]

Impact

  1. RATs let attackers access file systems and operating system functions, leading to full control of the host system.
  2. It can deploy keyloggers to steal the credentials from the user. 
  3. Crypto wallets can be misused by the threat actors for illicit transactions.
  4. By hijacking the host systems’ peripherals like camera, microphone etc, the malware can violate the user’s privacy. 
  5. It can also make the host connect to a botnet and carry out attacks on other targets without the affected user’s consent.
[/vc_wp_text][vc_wp_text]

Mitigation

  1. Download applications from trusted sources.
  2. Use spam filters and antivirus programs to detect and filter suspicious emails.
  3. Backup your data at regular intervals.
  4. Use a firewall, antivirus, or anti-malware software.
  5. Use strong passwords.
  6. Create awareness among users about such attacks.

Get Global Threat Intelligence on Real Time

Protect your business from cyber threats with real-time global threat intelligence data.. 30-day free and No Commitment Trial.
Schedule a Demo
Real time Threat Intelligence Data
More information and context about Underground Chatter
On-Demand Research Services
Dashboard mockup
Global Threat Intelligence Feed

Protect and proceed with Actionable Intelligence

The Global Cyber Threat Intelligence Feed is an innovative platform that gathers information from various sources to help businesses and organizations stay ahead of potential cyber-attacks. This feed provides real-time updates on cyber threats, including malware, phishing scams, and other forms of cybercrime.
Trusted by 400+ Top organisations