Zumanek Remote Access Trojan Threat Intel Advisory

Published on October 22, 2020 | 14:30 IST

Share this Advisory:

Type
Trojan
Sector
Banking

 

Zumanek is a malware categorized as a banking Remote Access Trojan (RAT). It was distributed in October 2020 targeting Latin American banking customers.

This malware is distributed through social engineering. In this, cybercriminals use phishing tactics to trick users into downloading and installing Zumanek in their systems without their consent. The primary purpose of Zumanek is to steal bank accounts and crypto wallet credentials. 

Currently, the trojan has targeted users mainly in Brazil. Also, dropper (the ‘executable’ which downloads Zumanek) checks the system’s geolocation, and if it is not Brazil, the trojan is not downloaded. Since the motivation of the cybercriminals is purely financial, the hijacked bank accounts and crypto wallets are likely misused for fraudulent online purchases, account transfers, etc. Thus, this infection might lead to significant financial loss to the users.

Indicators of Compromise

Filename- 04042019071032osGBzySulM.bin

MD5- 2c110060e1b90907dbf25e0f57e49740

SHA1- 76883946f89b9197a3e1a725658b821375f7b029

SHA256- 939f40b01e1fb0f3e7a2524154280cd92706de44fcec7ed8477754bf674f954f

Impact

  1. RATs let attackers access file systems and operating system functions, leading to full control of the host system.
  2. It can deploy keyloggers to steal the credentials from the user. 
  3. Crypto wallets can be misused by the threat actors for illicit transactions.
  4. By hijacking the host systems’ peripherals like camera, microphone etc, the malware can violate the user’s privacy. 
  5. It can also make the host connect to a botnet and carry out attacks on other targets without the affected user’s consent.

Mitigation

  1. Download applications from trusted sources.
  2. Use spam filters and antivirus programs to detect and filter suspicious emails.
  3. Backup your data at regular intervals.
  4. Use a firewall, antivirus, or anti-malware software.
  5. Use strong passwords.
  6. Create awareness among users about such attacks.

Be informed in your Inbox

Sign up now to our Threat intelligence Newsletter and be the first to know about threats first in your inbox.

Join the Discussions

Discuss your way into our Community about these threats and stay Vigilant and informed.