Cybercriminals are using valid VMware binary to go serve on banking trojans in a accessory phishing flesh and blood targeting the Brazilian financial sector.
The trojan uses an definite VMware binary to deceive security tools into helpful errant ruckus and to bypass security checks because if the initial binary, such as vm.png, is accepted, in addition to the security tools have the funds for leave to enter that subsequent libraries will with be reliable, according to a Cisco Talos excuse.
Using a valid & signed DLL from VMware allows the malware to potentially rule undetected by using a technique known as DLL side loading which allows the genuine DLL to load a malicious DLL in memory, Cisco researchers told SC Media. The malware is along with packed after that than the Themida personal ad packet which makes it hard to analyze, they said.
Once the trojan has masqueraded as a valid process, it later uses a broad range of techniques to stay hidden as soon as the want of stealing banking credentials from the fanatic. The malware's attempts to avoid detection using quantity layers of obfuscation and DLL side loading in create the malware particularly dangerous, the researchers explained.
Attackers send victims spam messages written in Portuguese enticing them to door a Boleto invoice, a popular Brazilian payment method. The phishing emails contains a file later than a URL that redirects users to a goo.gl URL shortener, subsequently sends them to a RAR library that contains a JAR file, researchers said in the adding together.
If a victim double-clicks the JAR file, it triggers a Java process that initializes malicious code and installs the banking Trojan. Cisco researchers said the malware is specific to Brazilian banks and is unlikely to pivot uncovered the country. Although the trojan is specific to the region, it doesn't try the assailant lives there but rather suggests attackers chosen there are less security living users busy in the targeted place.















