Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Grandoreiro (Banking Trojan) – Malware

May 20, 2024
Reading Time: 13 mins read
in Malware
Grandoreiro  (Banking Trojan) – Malware

Grandoreiro

Type of Malware

Banking Trojan

Date of initial activity

2016

Country of Origin

Latin America

Targeted Countries

Traditionally Latin America, Spain and Portugal, and more recently Mexico and South Africa

Motivation

Financial gain

Attack Vectors

Spam seems to be the sole distribution method for Grandoreiro. The spam emails appear to contain a link pointing to a website offering fake Flash or Java updates

Targeted System

Windows

Tools

Grandoreiro banking trojan (primary malware)
Grandoreiro downloader (used to download and install the main malware)
Grandoreiro spam tool (used to create and send spam emails for distribution)

Variants

Win32/Spy.Grandoreiro.A
Win32/Spy.Grandoreiro.AE
Win32/Spy.Grandoreiro.AJ
Win32/TrojanDownloader.Banload.YJR
Win32/TrojanDownloader.Banload.YLZ
Win32/TrojanDownloader.Banload.YJB
Win32/TrojanDownloader.Banload.YMI
Win32/Spy.Grandoreiro.AD

Overview

Grandoreiro is a Latin American banking trojan written in Delphi that was first observed in 2016 and uses a Malware-as-a-Service (MaaS) business model. Grandoreiro targets Brazil, Peru, and Mexico, and from 2019 Spain as well. While Spain was the most targeted country between 2020 and 2022, in 2023 researchers observed a clear switch of focus towards Mexico and Argentina, the latter being new to Grandoreiro.

Targets

The latest malware variant specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries including regions of Central and South America, Africa, Europe, and the Indo-Pacific

How they operate

Grandoreiro, a sophisticated piece of malware, operates with a well-defined methodology, showcasing its capability to compromise systems and evade detection effectively. Initially, Grandoreiro gains access to targeted systems through spearphishing links. This approach involves crafting highly convincing phishing emails containing malicious links, which, when clicked, execute the malware on the victim’s device. Once installed, Grandoreiro employs various execution techniques, such as using application programming interfaces (APIs) to carry out its malicious activities seamlessly within the victim’s environment. After achieving execution, Grandoreiro focuses on maintaining persistence and elevating its privileges. It achieves persistence by manipulating registry run keys and startup folders to ensure its continued presence across system reboots. In terms of privilege escalation, Grandoreiro can bypass User Account Control (UAC), allowing it to operate with elevated permissions without alerting the user. This ensures that the malware can execute its tasks with greater authority, potentially accessing and altering critical system components. To evade detection, Grandoreiro employs several defensive tactics. It utilizes binary padding to obfuscate its presence, making it harder for security tools to identify the malware. The malware also disables security software and modifies file and directory permissions to avoid detection and interference. Additionally, it uses various techniques to mask its activities, including disguising its processes and files to look like legitimate software, thus evading forensic scrutiny. Furthermore, Grandoreiro may deobfuscate or decode files to reveal their true nature only when needed, enhancing its ability to remain undetected. In its discovery phase, Grandoreiro systematically explores the infected system to gather critical information. It identifies application windows, files, directories, and processes, as well as assesses security software to understand the environment better. This reconnaissance allows the malware to tailor its actions according to the system’s configuration and security measures. For command and control, Grandoreiro uses domain generation algorithms (DGAs) to create a network of domains through which it can communicate with its operators. This method allows the malware to remain resilient against domain takedowns and continue its operations. Standard application layer protocols are also employed to blend in with regular network traffic, further concealing its activities. Finally, Grandoreiro exfiltrates data by leveraging command and control channels, ensuring that the stolen information is sent back to its operators. This process allows the attackers to retrieve sensitive data without raising suspicion. Overall, Grandoreiro’s operation demonstrates a sophisticated understanding of evasion and persistence techniques, making it a formidable threat in the cybersecurity landscape.

MITRE tactics and techniques

Initial Access T1192: Spearphishing Link Execution T1106: Execution through API Persistence T1060: Registry Run Keys / Startup Folder Privilege Escalation T1088: Bypass User Account Control Defense Evasion T1009: Binary Padding T1089: Disabling Security Tools T1140: Deobfuscate/Decode Files or Information T1222: File and Directory Permissions Modification T1036: Masquerading Discovery T1010: Application Window Discovery T1083: File and Directory Discovery T1057: Process Discovery T1063: Security Software Discovery T1082: System Information Discovery Collection T1056: Input Capture Command and Control T1483: Domain Generation Algorithms T1071: Standard Application Layer Protocol Exfiltration T1041: Exfiltration Over Command and Control Channel
References:
  • Grandoreiro: How engorged can an EXE get?
  • ESET takes part in global operation to disrupt the Grandoreiro banking trojan
  • Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns
Tags: AfricaBanking TrojanBanksBrazilDelphiEuropeGrandoreiroLatin AmericaMaaSMalwareMexicoPeruSouth AmericaSpainTrojan
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial