Zumanek Remote Access Trojan Threat Intel Advisory

Summary

CloudSEK Threat Intelligence Advisory on Zumanek Trojan, malware variant that hijacks bank accounts and steals crypto wallet credentials.
Type
Trojan
Sector
Banking
  Zumanek is a malware categorized as a banking Remote Access Trojan (RAT). It was distributed in October 2020 targeting Latin American banking customers. This malware is distributed through social engineering. In this, cybercriminals use phishing tactics to trick users into downloading and installing Zumanek in their systems without their consent. The primary purpose of Zumanek is to steal bank accounts and crypto wallet credentials.  Currently, the trojan has targeted users mainly in Brazil. Also, dropper (the 'executable' which downloads Zumanek) checks the system's geolocation, and if it is not Brazil, the trojan is not downloaded. Since the motivation of the cybercriminals is purely financial, the hijacked bank accounts and crypto wallets are likely misused for fraudulent online purchases, account transfers, etc. Thus, this infection might lead to significant financial loss to the users.[/vc_wp_text][vc_wp_text]

Indicators of Compromise

Filename- 04042019071032osGBzySulM.bin MD5- 2c110060e1b90907dbf25e0f57e49740 SHA1- 76883946f89b9197a3e1a725658b821375f7b029 SHA256- 939f40b01e1fb0f3e7a2524154280cd92706de44fcec7ed8477754bf674f954f[/vc_wp_text][vc_wp_text]

Impact

  1. RATs let attackers access file systems and operating system functions, leading to full control of the host system.
  2. It can deploy keyloggers to steal the credentials from the user. 
  3. Crypto wallets can be misused by the threat actors for illicit transactions.
  4. By hijacking the host systems’ peripherals like camera, microphone etc, the malware can violate the user’s privacy. 
  5. It can also make the host connect to a botnet and carry out attacks on other targets without the affected user’s consent.
[/vc_wp_text][vc_wp_text]

Mitigation

  1. Download applications from trusted sources.
  2. Use spam filters and antivirus programs to detect and filter suspicious emails.
  3. Backup your data at regular intervals.
  4. Use a firewall, antivirus, or anti-malware software.
  5. Use strong passwords.
  6. Create awareness among users about such attacks.

Table of Contents

Request an easy and customized demo for free