{"id":660,"date":"2024-06-20T18:08:25","date_gmt":"2024-06-20T18:08:25","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=660"},"modified":"2024-06-20T18:08:25","modified_gmt":"2024-06-20T18:08:25","slug":"red-mongoose-daemon-a-new-banking-trojan-identified-in-may-2024-by-scilabs","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2024\/06\/20\/red-mongoose-daemon-a-new-banking-trojan-identified-in-may-2024-by-scilabs\/","title":{"rendered":"Red Mongoose Daemon: a new banking trojan identified in May 2024 by SCILabs"},"content":{"rendered":"<h1><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-662 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/RMD.png\" alt=\"\" width=\"243\" height=\"238\" \/><\/h1>\n<p style=\"text-align: center\"><strong><em>Red Mongoose Daemon: a new banking trojan<\/em><\/strong><\/p>\n<h1>Overview<\/h1>\n<p>The purpose of this document is to describe TTPs and provide indicators of compromise related to a new banking trojan that SCILabs identified during May through a threat monitoring and hunting in LATAM and named <em>Red Mongoose Daemon.<\/em><\/p>\n<p>The main objective of <em>Red Mongoose Daemon<\/em> is to steal victims&#8217; banking information by spoofing <a href=\"https:\/\/www.adyen.com\/es_MX\/metodos-de-pago\/pix\">PIX<\/a> transactions through overlapping windows. This trojan is aimed at Brazilian end users and employees of organizations with banking information.<\/p>\n<p>SCILabs was unable to identify the distribution method of this threat, however, based on its experience and the name of the files used in the identified campaign, such as \u201c<strong>Apelacao_Processo-NNYN.msi<\/strong>\u201d, \u201c<strong>Processo-judicial.B9WU<\/strong>\u201d, and \u201c<strong>Pedido_Faturado. -WJVUC<\/strong>\u201d, to mention a few, it is likely that the distribution method is through malicious emails using invoices and legal issues as pretexts, just like it is common in the activity of banking trojans in LATAM such as <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em>.<\/p>\n<h1>How could Red Mongoose Daemon impact organizations?<\/h1>\n<p><em>Red Mongoose Daemon <\/em>can steal banking information from all types of users, including organization employees. Additionally, it has command execution capabilities, as well as advanced anti-analysis and persistence methods that will be described later, which increase the possibility of successful attacks. If an attack is successful within an organization, cybercriminals can leak or sell the stolen information in clandestine Dark Web forums or on the black market, putting at risk the confidentiality, integrity, and availability of the information, leading to financial and reputation losses.<\/p>\n<h1>Analysis<\/h1>\n<h2>Threat Context<\/h2>\n<p>During May, through a threat monitoring in the region, SCILabs identified a malicious file compressed in ZIP format. Upon conducting the analysis, TTPs different from those of other trojans discovered and reported by SCILabs were identified, such as the use of the legitimate tool <a href=\"https:\/\/www.daemon-tools.cc\/spa\/downloads\">Daemon Tools<\/a>, and the creation and pseudo-random modification of directories for their persistence; that is how it was given the name of <em>Red Mongoose Daemon<\/em>.<\/p>\n<p>SCILabs was unable to identify the distribution method for this campaign. However, \u00a0being common in banking trojan campaigns in LATAM, phishing emails are likely to be used under the guise of supposed invoices, legal matters, and tax notes. These emails mostly contain embedded URLs that redirect the victim to sites for automatic downloading of ZIP-type files, which contain MSI files named after the pretext used, for example, \u201c<strong>Apelacao_Processo-NNYN.msi<\/strong>.\u201d<\/p>\n<p>Because the names of the artifacts found were written in Portuguese and it is the Brazilian payment system PIX which the trojan attempts to impersonate, with a high confidence level, SCILabs determined that this campaign is aimed at Brazilian users.<\/p>\n<p>During the investigation, SCILabs identified some overlaps with the <em>Javali\/Ousaban<\/em> banking trojan, which are have general characteristics such as the appearance of some C2 Endpoints (shown below in Figure 1) and capabilities such as the manipulation of windows of the operating system (this technique is used by the majority of LATAM banking trojans); however, the infection chain, which will be detailed later, and the DLL of the trojan, in comparison with <em>Javali\/Ousaban<\/em> campaigns.<\/p>\n<p>Based on the above, SCILabs has the hypothesis that the threat actors behind <em>Red Mongoose Daemon <\/em>are also the operators of <em>Javali\/Ousaban<\/em> and will continue monitoring them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-663 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/1.png\" alt=\"\" width=\"622\" height=\"355\" \/><\/p>\n<p style=\"text-align: center\">Figure 1. (1 &#8211; Top) Template used by <em>Javali\/Ousaban<\/em> operators to query infected machines, (2 &#8211; Bottom) Template used by <em>Red Mongoose Daemon<\/em> operators with the same objective<\/p>\n<h2>Technical summary<\/h2>\n<p>The identified MSI file is named \u201c<strong>Apelacao_Processo-NNYN.msi<\/strong>\u201d and corresponds to the first <em>Red Mongoose Daemon <\/em>dropper. The infection chain begins if the victim executes it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-664 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/2.png\" alt=\"\" width=\"429\" height=\"169\" \/><\/p>\n<p style=\"text-align: center\">Figure 2. First Dropper<\/p>\n<p>&nbsp;<\/p>\n<p>The MSI file contains the following artifacts:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>exe: <\/strong>The real name of this artifact is DTShellHlp.exe, which corresponds to a legitimate component of the <a href=\"https:\/\/www.daemon-tools.cc\/spa\/home\">DAEMON Tools software<\/a>. This Windows\u2019 executable is used to create virtual drives and mount disk images, providing different functionalities, such as a context menu, to facilitate their creation. It is mainly used in videogame environments.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"text-align: left\"><strong>dll: <\/strong>This artifact is the malicious <em>Red Mongoose Daemon<\/em> DLL, loaded into memory through the <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\">DLL Side-Loading<\/a> technique after executing the previous legitimate artifact.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-665 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/3.png\" alt=\"\" width=\"729\" height=\"104\" \/>Figure 3. Compressed content of the first dropper<\/p>\n<p>Once the victim executes the MSI file, the trojan is installed in the <strong>%APPDATA%\/[directory with the pseudo-random name]<\/strong>. According to the analysis, the name of the installation directory may correspond to some legitimate applications such as \u201c<strong>Dev-Cpp<\/strong>,\u201d \u201c<strong>Wireshark<\/strong>,\u201d \u201c<strong>Softplicity<\/strong>,\u201d and \u201c<strong>Notepad++<\/strong>,\u201d and sometimes, simply random letters such as \u201c<strong>CDTPL<\/strong>.\u201d<\/p>\n<p>In that same sense, the name of the DAEMON Tools executable is also assigned in a pseudo-random manner, placing names such as \u201c<strong>recent_common<\/strong>,\u201d \u201c<strong>cache<\/strong>,\u201d \u201c<strong>recent<\/strong>,\u201d \u201c<strong>Temp<\/strong>,\u201d or <strong>bck&lt;execution date&gt;<\/strong>, to mention a few. In the following figures (4, 5, and 6), there are different directories as examples where the executables (red icon) and the DLLs of the trojan are installed, which are sometimes renamed with the \u201c.jwt\u201d. If there is a legitimate installation of the applications mentioned above, the trojan does not modify its directories or files; it places the loader and the malicious <em>Red Mongoose Daemon<\/em> DLL.<\/p>\n<p>In the following images, in addition to the trojan, there are other types of files with \u201c.ini,\u201d \u201c.xml,\u201d or \u201c.cfg\u201d extensions, which correspond to legitimate installations of the applications mentioned above and which have no relation to the chain of infection.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-666 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/4.png\" alt=\"\" width=\"737\" height=\"295\" \/><\/p>\n<p style=\"text-align: center\">Figure 4. Example of execution in Dev-Cpp directory<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-667 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/5.png\" alt=\"\" width=\"654\" height=\"256\" \/><\/p>\n<p style=\"text-align: center\">Figure 5. Example of running in Wireshark directory<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-668 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/6.png\" alt=\"\" width=\"632\" height=\"520\" \/><\/p>\n<p style=\"text-align: center\">Figure 6. Example of execution in Notepad++ directory<\/p>\n<p><em>Red Mongoose Daemon <\/em>generates persistence using scheduled tasks that run every 5 minutes and a shortcut in the Windows home directory. It is important to mention that, with each computer restart, the trojan is reinstalled in a different directory.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-669\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/7.png\" alt=\"\" width=\"1380\" height=\"209\" \/><\/p>\n<p style=\"text-align: center\">Figure 7. Persistence through scheduled tasks<\/p>\n<p>As soon as the process starts, the malicious DLL and the legitimate executable change their name and extension to a name like <strong>&lt;12 random numbers&gt;.jwt<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-670 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/8.png\" alt=\"\" width=\"744\" height=\"301\" \/><\/p>\n<p style=\"text-align: center\">Figure 8. trojan execution<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-672 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/9-1.png\" alt=\"\" width=\"711\" height=\"259\" \/><\/p>\n<p style=\"text-align: center\">Figure 9. Files renamed by the trojan<\/p>\n<p>Subsequently, it sets the registry key HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\\PROXYBYPASS with a value of 1 to try to evade security mechanisms and communicate freely with external servers, which is a common tactic to maintain persistence and control over the infected system.<\/p>\n<p><em>Red Mongoose Daemon<\/em> performs a query with its C2 through the URL <strong>hxxps[:]\/\/rdcontra.com\/clientes\/index.php<\/strong>, where it saves the victim&#8217;s data such as IP, date of infection, device name, user, and country of origin. It is essential to mention that, if anybody tries to access it from the Internet (port 80 or 8080), a redirection is made to the URL hxxps[:]\/\/i.pinimg.com\/236x\/5b\/f8\/1a\/5bf81a501ab9d26db806e7fec4edfa75.jpg that corresponds to an image not used during the infection chain and can only be viewed from a web interface.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-673 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/10.png\" alt=\"\" width=\"590\" height=\"339\" \/><\/p>\n<p style=\"text-align: center\">Figure 10. Redirection URL<\/p>\n<p>The process chain created by this threat is:<\/p>\n<ul>\n<li>MSI file execution<\/li>\n<li>exe<\/li>\n<li>exe<\/li>\n<li>exe (\/delete \/f \/tn &#8220;FomsTudio\u00aa&#8221;)<\/li>\n<li>exe (\/create \/SC MINUTE \/MO 5 \/TN &#8220;[random name]&#8221; \/tr &#8220;%APPDATA%\\&lt;random directory&gt;\\[random name].exe k7&#8221;) migrating to recent_common.exe process<\/li>\n<\/ul>\n<p>An important point to note is that the trojan needs the \u201ck7\u201d parameter to run successfully.<\/p>\n<p>If the user enters a site that allows the PIX payment method of the Central Bank of Brazil, the trojan performs the window overlay technique to steal the victims&#8217; information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-674 aligncenter\" style=\"text-align: center\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/11.png\" alt=\"\" width=\"517\" height=\"319\" \/><\/p>\n<p style=\"text-align: center\">Figure 11. Window used by the trojan that tries to impersonate a PIX transaction<\/p>\n<p>Finally, SCILabs identified that <em>Red Mongoose Daemon<\/em> has capabilities for manipulating and creating windows, executing commands, controlling the computer remotely, manipulating web browsers, hijacking clipboards, and impersonating Bitcoin wallets by replacing copied wallets with the ones used by cybercriminals, such as the following: <strong>1Jp4A7NEwhk2uNPnZbewN9QfCdoXFRL9Xp<\/strong>. So far, no transactions have been identified using that wallet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-675 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/12.png\" alt=\"\" width=\"856\" height=\"241\" \/><\/p>\n<p style=\"text-align: center\">Figure 12. Attackers&#8217; Bitcoin wallet balance<\/p>\n<p>During the analysis, some common characteristics were identified in trojans that affect LATAM, such as <em>Mekotio, Javali\/Ousaban<\/em>, and <em>Grandoreiro<\/em>. Some of them are the ability to manipulate the browser and the generation of Windows operating system\u2019s windows.<\/p>\n<p>While no windows associated with other banks were detected, the presence of these characteristics suggests that the trojan might also target other Brazilian banks.<\/p>\n<p>In addition, during the dynamic analysis, it was identified that the trojan monitors the access to domains such as Outlook, Hotmail, and OneDrive, among others, so it is possible that it also aims to steal credentials.<\/p>\n<p><strong><em>Red Mongoose Daemon\u2019s <\/em><\/strong><strong>notable characteristics<\/strong><\/p>\n<p>Below, some distinctive characteristics of <em>Red Mongoose Daemon<\/em> are mentioned and compared with <em>Javali\/Ousaban trojan<\/em> campaigns previously observed in the region, aiming to provide clarity in the identification of this new threat for future investigations, given that SCILabs identified some overlaps like as the appearance of some C2 Endpoints with <em>Javali\/Ousaban<\/em>, mentioned in the \u201cThreat Context\u201d section of this document.<\/p>\n<ul>\n<li>Unlike the <em>Javali\/Ousaban<\/em> campaigns observed in public sources in 2021 and others by SCILabs since 2023, the architecture of the <em>Red Mongoose Daemon<\/em> DLL is 64 bits.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>During the analyses carried out by SCILabs, it has been identified that threat actors use Borland\/Embarcadero Delphi &lt;= 10 along with Turbo Linker 2.5 in the process of building the <em>Javali<\/em> trojan DLL; on the contrary, in the <em>Red Mongoose Daemon<\/em> campaign, the use of Delphi 11, Turbo Linker 8 and MSLinker 8 was identified, the latter possibly to ensure compatibility with the use of library dependencies compiled with Visual Studio.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>A notable difference between the <em>Javali\/Ousaban<\/em> campaigns and the <em>Red Mongoose Daemon <\/em>campaign is the absence of packers in the latter. In <em>Javali\/Ousaban<\/em> campaigns, it is common to observe the use of packers such as VMProtect, Themida, and ENIGMA, but the threat actors in the <em>Red Mongoose Daemon<\/em> campaign did not use any packer.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>The trojan is detected by VirusTotal antivirus solutions, mainly as a generic trojan, in contrast to <em>Javali\/Ousaban<\/em> campaigns, which are labeled as <em>Ousaban<\/em> by most antiviruses.<\/li>\n<\/ul>\n<p>As can be seen in the following list, which shows some of the trojan&#8217;s capabilities through the analysis of the classes implemented in its source code, this trojan has the capabilities of most Latin American banking trojans, such as window spoofing and browser manipulation, except for the PIX transaction spoofing not previously observed by SCILabs.<\/p>\n<ul>\n<li>TClipBoard: Clipboard manipulation<\/li>\n<li>TMouse: Mouse manipulation<\/li>\n<li>TDragObject: Image Manipulation in Window Instances<\/li>\n<li>TJSONObject, TJSONArray: Manipulating data in JSON format<\/li>\n<li>TCustomCanvas, TCanvas, TScrollBar, TCustomPanningWindow: Creating and manipulating windows<\/li>\n<li>THTTPClient: C2 communication<\/li>\n<li>TGraphic, TPicture: Graphics and images manipulation<\/li>\n<li>PixTrocar: PIX window manipulation<\/li>\n<\/ul>\n<p>The following table summarizes the general differences between <em>Javal\u00ed\/Ousaban<\/em> and <em>Red Mongoose Daemon<\/em>.<\/p>\n<table align=\"center\">\n<tbody>\n<tr>\n<td width=\"215\">\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center\" width=\"215\"><em>Javal\u00ed\/Ousaban<\/em><\/td>\n<td style=\"text-align: center\" width=\"215\"><em>Red Mongoose Daemon<\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"215\"><strong>DLL architecture<\/strong><\/td>\n<td style=\"text-align: center\" width=\"215\">X32<\/td>\n<td style=\"text-align: center\" width=\"215\">X64<\/td>\n<\/tr>\n<tr>\n<td width=\"215\"><strong>Programming Language<\/strong><\/td>\n<td style=\"text-align: center\" width=\"215\">Borland\/Embarcadero Delphi &lt;= 10<\/td>\n<td style=\"text-align: center\" width=\"215\">Delphi 11<\/td>\n<\/tr>\n<tr>\n<td width=\"215\"><strong>Linker<\/strong><\/td>\n<td style=\"text-align: center\" width=\"215\">Turbo Linker 2.5<\/td>\n<td width=\"215\">Turbo Linker 8 y MSLinker 8<\/td>\n<\/tr>\n<tr>\n<td width=\"215\"><strong>Packer<\/strong><\/td>\n<td style=\"text-align: center\" width=\"215\">VMProtect, Themida y ENIGMA<\/td>\n<td style=\"text-align: center\" width=\"215\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"215\"><strong>Label assigned by most antivirus solutions on VirusTotal<\/strong><\/td>\n<td style=\"text-align: center\" width=\"215\"><em>Ousaban<\/em><\/td>\n<td style=\"text-align: center\" width=\"215\"><em>Generic trojan<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center\">Table 1. Differences between <em>Javal\u00ed\/Ousaban<\/em> and <em>Red Mongoose Daemon<\/em><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2>Observed attack flow summary<\/h2>\n<ul>\n<li>It is highly likely that the victim will receive a phishing email with pretexts related to supposed invoices, legal matters, and digital tax notes.<\/li>\n<li>The email probably contains a URL that takes the user to an automatic download site for a ZIP file.<\/li>\n<li>Inside the compressed file, there is an MSI-type file.<\/li>\n<li>If the victim executes the MSI file, the infection chain begins.<\/li>\n<li>2 files contained in the MSI are deployed in the %APPDATA%\/[random pseudo name] directory. The executable legitimate Daemon Tool has a pseudo-random name, s the loader and the trojan DLL.<\/li>\n<li>The [Random Pseudo Name].exe process is started, and the <em>Red Mongoose Daemon<\/em> DLL is loaded using the DLL Side-Loading technique.<\/li>\n<li>Persistence is generated through a scheduled task that runs every 5 minutes and through a shortcut in the Windows home directory. On each reboot, the installation directory and the name of the loader change.<\/li>\n<li>The trojan waits for the victim to consult a site that allows PIX transactions to steal information through window overlays and possibly steal information from other banks and credentials from sites such as Outlook, Hotmail, and OneDrive.<\/li>\n<li>The trojan connects with the C2 to share the stolen information.<\/li>\n<\/ul>\n<h2>Attack flow diagram<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-676 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/13.png\" alt=\"\" width=\"763\" height=\"249\" \/><\/p>\n<p style=\"text-align: center\">Figure 13. Attack Flow diagram<\/p>\n<h2><strong>Observed TTPs aligned to the MITRE\u00ae ATT&amp;CK framework<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-677 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/06\/mitre.png\" alt=\"\" width=\"651\" height=\"533\" \/><\/p>\n<p style=\"text-align: center\">Table 1. Observed TTPs aligned to the MITER\u00ae ATT&amp;CK framework<\/p>\n<h2>Conclusion<\/h2>\n<p>SCILabs considers <em>Red Mongoose Daemon<\/em> a significant threat in the region due to its advanced persistence and defense evasion techniques mentioned in this report. This trojan is likely to expand its activity to other Latin American countries, such as Mexico, and other trojans, such as <em>Grandoreiro<\/em>, <em>Mekotio<\/em>, and <em>Javali<\/em>, will adopt some TTPs mentioned in this report. Additionally, this trojan&#8217;s operators are expected to modify their artifacts and attack flow to ensure a higher success rate in their attacks.<\/p>\n<p>SCILabs considers it essential that institutions and companies are aware of updates to TTPs and compromise indicators to minimize the risk of infection and the impact that the theft of banking information can have on organizations. We suggest considering the following recommendations:<\/p>\n<p><strong><em>Red Mongoose Daemon<\/em><\/strong><strong> Specific Recommendations<\/strong><\/p>\n<ul>\n<li>Add the IoCs shared in this document to your security solutions.<\/li>\n<li>Regarding emails, it is recommended to:\n<ul>\n<li>Avoid opening emails from unknown senders<\/li>\n<li>Avoid opening suspicious links<\/li>\n<li>Avoid opening or downloading suspicious files<\/li>\n<\/ul>\n<\/li>\n<li>Conducting comprehensive threat-hunting activities on EndPoint processes is a major security measure. Look for any suspicious and persistent processes in scheduled tasks and operating system home directories, particularly those with names such as bck&lt;execution date&gt;.exe or names of applications not authorized by the organization.<\/li>\n<li>Verify if the Daemon Tools and FormsTudio tools are installed, if they are legitimate or were consciously carried out by the user. Conduct an in-depth investigation to rule out or confirm an infection of the <em>Red Mongoose Daemon<\/em> banking trojan.<\/li>\n<li>Perform threat hunting activities on your EndPoints seeking to find directories or files with suspicious names such as \u201cDTCommonRes.dll.exe\u201d within the paths commonly used by <em>Red Mongoose Daemon<\/em>, as well as all directories in %APPDATA%.<\/li>\n<\/ul>\n<p><strong>Hashes SHA256<\/strong><\/p>\n<p>C855545D4607BD7A370F0B6AE575171050A7E9D003A4DA157EF90C15A2A92EEB<\/p>\n<p>E1E2E0E4FF5C0FAE93B7D7526C5C0398E482EDDE0F5A0AF71430FFF5C852E1A6<\/p>\n<p>27940A0201C50163493B8920588D932978A5AE8B192F7BF710FF030CCF048DB7<\/p>\n<p>4E7A3F1CA0545919831F6CFAC4C7194716EB8B67FB15DBBB63C577E66F856E07<\/p>\n<p>38D19F6C43007B1B314BE3C3E093E042F6F29638AF42F6045828C15901459DAB<\/p>\n<p>78F865BC8012AC787408ECCE89CC8C6DBC294EBF929C62283C39504D9B1EEE2C<\/p>\n<p>532CA82269C60CC6FC9197413C9BCC1CCA840F40B966524F1C2681660196C7F9<\/p>\n<p>282FC28644DB919FEE960F1D09C94076EB5CC57C266E25D47DC1C13E38EAC27A<\/p>\n<p><strong>URLs<\/strong><\/p>\n<p><span style=\"color: #ff0000\">It is recommended to completely block URLs to avoid future false positives or interruptions in the operation.<\/span><\/p>\n<p>hxxps[:]\/\/i.pinimg.com\/236x\/5b\/f8\/1a\/5bf81a501ab9d26db806e7fec4edfa75.jpg<\/p>\n<p>hxxps[:]\/\/rdcontra.com\/clientes\/index.php<\/p>\n<p>hxxps[:]\/\/rdcontra.com\/awstats\/awstats.pl<\/p>\n<p>hxxp[:]\/\/34.68.151.162\/arquivo.msi<\/p>\n<p>hxxp[:]\/\/galvaoministerio.com<\/p>\n<p>hxxp[:]\/\/brigadafraternidade.com<\/p>\n<p>hxxps[:]\/\/notas.blogdns.net\/6E%2028%205B%205E_5E128%205B%205E_5E%2028%205B%205E_5E128%205B%205E_5E%2028%205B%205E_5E128%205B%205E_\/<\/p>\n<p>hxxps[:]\/\/newsfoos.from-mo.com\/<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Red Mongoose Daemon: a new banking trojan Overview The purpose of this document is to describe TTPs and provide indicators<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[9,15],"class_list":["post-660","post","type-post","status-publish","format-standard","hentry","category-malware","tag-banking-trojan","tag-malware"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}