Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution
A new banking Trojan named Maverick has emerged, targeting Brazilian users through a massive WhatsApp distribution campaign. The infection chain begins with a malicious LNK file sent via WhatsApp, leading to a complex, fileless infection process. Maverick uses the WPPConnect project to automate message sending from hijacked accounts, spreading the malware further. The Trojan monitors 26 Brazilian bank websites, 6 cryptocurrency exchanges, and 1 payment platform, aiming to capture banking credentials. It employs advanced evasion techniques, including AI-assisted code development, and shares similarities with the Coyote banking Trojan. The campaign's impact is significant due to its worm-like nature and exploitation of a popular messaging platform.
AI Analysis
Technical Summary
The threat described involves a new wave of attacks by a Mirai botnet variant exploiting a recently disclosed vulnerability identified as CVE-2024-3721. This vulnerability affects TBK brand Digital Video Recorder (DVR) devices, which are commonly used in surveillance and security camera systems. The exploitation method involves sending a specially crafted POST request that allows unauthenticated attackers to execute arbitrary system commands on the targeted device. Upon successful exploitation, the attacker downloads and executes an ARM32 binary payload, which is a variant of the Mirai malware. This variant incorporates advanced evasion techniques such as RC4 string encryption to obfuscate its code and communications, anti-virtual machine (VM) checks, and anti-emulation methods to avoid detection and analysis in sandboxed or virtualized environments. The malware also verifies that it is running in allowed directories before proceeding, which further complicates forensic analysis and detection. The primary objective of this botnet is to conscript vulnerable DVR devices into a large-scale distributed denial-of-service (DDoS) botnet, leveraging their network connectivity and processing power to overwhelm targeted systems or networks. The campaign has identified over 50,000 exposed TBK DVR devices as potentially vulnerable, with infections primarily reported in countries including China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Although the campaign is currently not reported to have active exploits in the wild beyond initial observations, the scale of vulnerable devices and the sophistication of the malware indicate a significant threat vector. The lack of available patches or firmware updates for these devices exacerbates the risk, making mitigation reliant on device resets and network-level protections. The technical sophistication of the malware, combined with the critical role of DVR devices in security infrastructure, underscores the importance of addressing this vulnerability promptly.
Potential Impact
For European organizations, the exploitation of CVE-2024-3721 in TBK DVR devices presents several risks. Many organizations, including enterprises, government agencies, and critical infrastructure operators, rely on DVRs for surveillance and security monitoring. Compromise of these devices can lead to unauthorized access to video feeds, loss of confidentiality, and potential manipulation or disruption of security monitoring. More critically, infected devices become part of a botnet used to launch DDoS attacks, which can degrade or disrupt network availability not only for the infected organization but also for external targets. This can result in service outages, reputational damage, and financial losses. Additionally, the presence of malware on security devices undermines trust in physical security systems and may complicate incident response efforts. The anti-VM and anti-emulation features of the malware make detection and analysis more difficult, potentially allowing infections to persist undetected for longer periods. Given the interconnected nature of IoT and security devices, lateral movement or further exploitation could be possible if attackers leverage these compromised DVRs as footholds. The medium severity rating reflects the combination of ease of exploitation (no authentication required), the scale of vulnerable devices, and the potential for significant operational disruption through DDoS activities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should take several targeted actions beyond generic IoT security advice: 1) Conduct an immediate inventory of all TBK DVR devices within their networks to identify potentially vulnerable units. 2) Where possible, apply firmware updates or patches provided by the vendor; if no official patches exist, contact the vendor for guidance or consider device replacement. 3) Perform factory resets on affected devices to remove any persistent malware infections. 4) Segment DVR devices on isolated network segments with strict access controls to limit exposure and prevent lateral movement. 5) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect Mirai-related traffic patterns and anomalous POST requests targeting DVR devices. 6) Employ egress filtering to restrict unauthorized outbound connections from IoT devices, limiting botnet command and control communications. 7) Monitor network traffic for signs of DDoS activity originating from internal devices and establish incident response procedures for rapid containment. 8) Disable unnecessary services and change default credentials on all IoT and DVR devices to reduce attack surface. 9) Consider deploying honeypots or deception technologies to detect attempts to exploit this vulnerability. 10) Collaborate with national cybersecurity centers and ISACs to share threat intelligence and receive timely updates on emerging exploits.
Affected Countries
Russia, Ukraine, Turkey, Germany, France, Italy, United Kingdom, Poland, Netherlands, Spain
Indicators of Compromise
- hash: 011a406e89e603e93640b10325ebbdc8
- hash: 24fd043f9175680d0c061b28a2801dfc
- hash: 29b83f0aae7ed38d27ea37d26f3c9117
- hash: 2e9920b21df472b4dd1e8db4863720bf
- hash: 3120a5920f8ff70ec6c5a45d7bf2acc8
- hash: 3c2f6175894bee698c61c6ce76ff9674
- hash: 45a41ce9f4d8bb2592e8450a1de95dcc
- hash: 524a57c8c595d9d4cd364612fe2f057c
- hash: 6e7976666525a97639777d2d7f303177
- hash: 74dee23eaa98e2e8a7fc355f06a11d97
- hash: 761909a234ee4f1d856267abe30a3935
- hash: 7eb3d72fa7d730d3dbca4df34fe26274
- hash: 8a3e1176cb160fb42357fa3f46f0cbde
- hash: 8d92e79b7940f0ac5b01bbb77737ca6c
- hash: 95eaa3fa47a609ceefa24e8c7787bd99
- hash: 96ee8cc2edc8227a640cef77d4a24e83
- hash: aaf34c27edfc3531cf1cf2f2e9a9c45b
- hash: ba32f4eef7de6bae9507a63bde1a43aa
- hash: 02a9b16a19a03e75d42d1c9c83fa4a5414ce26dc
- hash: 05168a7a2816dc792d80f0a7c65b102b38e93bf1
- hash: 069a400624f2fcf69bca8a43fd52c05e95758927
- hash: 152b73f3e91eba572cbd8470a0f01adf363b7d64
- hash: 22b2333298b7cc9913c1eaf422dbe8830840d3e0
- hash: 2d877399e481a6ebded108631b55ff049c3316f4
- hash: 2e95bbf3069f603ae7ff882770f49dc36223a626
- hash: 46ee0aac6d64415146792c40a7f94989b5510107
- hash: 5160989ba4f8a75ef4e09dea0fda3bf7a2211fb7
- hash: 69adf42ea2216846631a85791b653b6ccbc45fb4
- hash: 6c4cbd259aa9d2a7f858ae607aa36da928f9268e
- hash: 961c5cb9288292a58c3df007948dbb8e3602192d
- hash: c57a8ef11ec531eafd62dcb6c3ae558ea59bed08
- hash: e77427eafc1ad985d83a37f68492318affaf466f
- hash: f836182a8a93db7985cdd67a5c1f5dbbf90bbe2a
- hash: 1c39dbf66a362df572af7ad64164cc7d70a8875db68a710979d243760d8c027b
- hash: 29754b61a1cce8c965bbc98efb125991b8b605dea9f3394c277092f30a109bdb
- hash: 2a397594a3b009df342886a3480264a8773971559c79c8f95b1319eae77c55d6
- hash: 3bdbed482342487e08f5266e1a9b6478fcd0be645edcfb1e8c6dda1dac73cce9
- hash: 438dc2a85e37356eefd2d40ac7bafa8c3ad273dd36991d4b155208c3a3d460b5
- hash: 4abacef49032666c0d0b4a006368386bdc6c0367f6c5e21b022b650fb8dabdbc
- hash: 52bd9e57f7db2716d2ec570bc9a5de9ba96bc620edb3ac9469b5b131b004a030
- hash: 7461c0f8feac69a39586c4c1ecfeb32627c5a83043721ba0144479efc0f036a1
- hash: 86ef39910b9361f012f889146e16b2e279a07465fe3e2f9b493ef0534a5c66c0
- hash: 9ae1955b9de5e4e6b23e55d2aab3230ff3a6b5c723d77a6653b2145719dc2eb6
- hash: b2be07ed781bcdef614cd7c1461d81bfd8df2bc7eb11b6bfb5b202af881d727c
- hash: dd2c66661d94f007d87754dcbc1ace9f228785676632a39fef2ce0e26d54e206
- hash: dd54e4a0220b6afbe0dbee66e32af3fe2012cc37023044a683e8e0c98579a059
- hash: e5f9a505082501b32d442a3fa6a9fb40a48b7da91a5a0efc5677bed5401e0c2b
- hash: f3989e7cca7d17c909c5f53945c7846d2d269d32113042bf535285c4d75624e6
- ip: 42.112.26.36
- ip: 63.231.92.27
Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution
Description
A new banking Trojan named Maverick has emerged, targeting Brazilian users through a massive WhatsApp distribution campaign. The infection chain begins with a malicious LNK file sent via WhatsApp, leading to a complex, fileless infection process. Maverick uses the WPPConnect project to automate message sending from hijacked accounts, spreading the malware further. The Trojan monitors 26 Brazilian bank websites, 6 cryptocurrency exchanges, and 1 payment platform, aiming to capture banking credentials. It employs advanced evasion techniques, including AI-assisted code development, and shares similarities with the Coyote banking Trojan. The campaign's impact is significant due to its worm-like nature and exploitation of a popular messaging platform.
AI-Powered Analysis
Technical Analysis
The threat described involves a new wave of attacks by a Mirai botnet variant exploiting a recently disclosed vulnerability identified as CVE-2024-3721. This vulnerability affects TBK brand Digital Video Recorder (DVR) devices, which are commonly used in surveillance and security camera systems. The exploitation method involves sending a specially crafted POST request that allows unauthenticated attackers to execute arbitrary system commands on the targeted device. Upon successful exploitation, the attacker downloads and executes an ARM32 binary payload, which is a variant of the Mirai malware. This variant incorporates advanced evasion techniques such as RC4 string encryption to obfuscate its code and communications, anti-virtual machine (VM) checks, and anti-emulation methods to avoid detection and analysis in sandboxed or virtualized environments. The malware also verifies that it is running in allowed directories before proceeding, which further complicates forensic analysis and detection. The primary objective of this botnet is to conscript vulnerable DVR devices into a large-scale distributed denial-of-service (DDoS) botnet, leveraging their network connectivity and processing power to overwhelm targeted systems or networks. The campaign has identified over 50,000 exposed TBK DVR devices as potentially vulnerable, with infections primarily reported in countries including China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Although the campaign is currently not reported to have active exploits in the wild beyond initial observations, the scale of vulnerable devices and the sophistication of the malware indicate a significant threat vector. The lack of available patches or firmware updates for these devices exacerbates the risk, making mitigation reliant on device resets and network-level protections. The technical sophistication of the malware, combined with the critical role of DVR devices in security infrastructure, underscores the importance of addressing this vulnerability promptly.
Potential Impact
For European organizations, the exploitation of CVE-2024-3721 in TBK DVR devices presents several risks. Many organizations, including enterprises, government agencies, and critical infrastructure operators, rely on DVRs for surveillance and security monitoring. Compromise of these devices can lead to unauthorized access to video feeds, loss of confidentiality, and potential manipulation or disruption of security monitoring. More critically, infected devices become part of a botnet used to launch DDoS attacks, which can degrade or disrupt network availability not only for the infected organization but also for external targets. This can result in service outages, reputational damage, and financial losses. Additionally, the presence of malware on security devices undermines trust in physical security systems and may complicate incident response efforts. The anti-VM and anti-emulation features of the malware make detection and analysis more difficult, potentially allowing infections to persist undetected for longer periods. Given the interconnected nature of IoT and security devices, lateral movement or further exploitation could be possible if attackers leverage these compromised DVRs as footholds. The medium severity rating reflects the combination of ease of exploitation (no authentication required), the scale of vulnerable devices, and the potential for significant operational disruption through DDoS activities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should take several targeted actions beyond generic IoT security advice: 1) Conduct an immediate inventory of all TBK DVR devices within their networks to identify potentially vulnerable units. 2) Where possible, apply firmware updates or patches provided by the vendor; if no official patches exist, contact the vendor for guidance or consider device replacement. 3) Perform factory resets on affected devices to remove any persistent malware infections. 4) Segment DVR devices on isolated network segments with strict access controls to limit exposure and prevent lateral movement. 5) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect Mirai-related traffic patterns and anomalous POST requests targeting DVR devices. 6) Employ egress filtering to restrict unauthorized outbound connections from IoT devices, limiting botnet command and control communications. 7) Monitor network traffic for signs of DDoS activity originating from internal devices and establish incident response procedures for rapid containment. 8) Disable unnecessary services and change default credentials on all IoT and DVR devices to reduce attack surface. 9) Consider deploying honeypots or deception technologies to detect attempts to exploit this vulnerability. 10) Collaborate with national cybersecurity centers and ISACs to share threat intelligence and receive timely updates on emerging exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/mirai-botnet-variant-targets-dvr-devices-with-cve-2024-3721/116742"]
- Adversary
- Mirai
- Pulse Id
- 6842e2da7eafc4bf38554913
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash011a406e89e603e93640b10325ebbdc8 | — | |
hash24fd043f9175680d0c061b28a2801dfc | — | |
hash29b83f0aae7ed38d27ea37d26f3c9117 | — | |
hash2e9920b21df472b4dd1e8db4863720bf | — | |
hash3120a5920f8ff70ec6c5a45d7bf2acc8 | — | |
hash3c2f6175894bee698c61c6ce76ff9674 | — | |
hash45a41ce9f4d8bb2592e8450a1de95dcc | — | |
hash524a57c8c595d9d4cd364612fe2f057c | — | |
hash6e7976666525a97639777d2d7f303177 | — | |
hash74dee23eaa98e2e8a7fc355f06a11d97 | — | |
hash761909a234ee4f1d856267abe30a3935 | — | |
hash7eb3d72fa7d730d3dbca4df34fe26274 | — | |
hash8a3e1176cb160fb42357fa3f46f0cbde | — | |
hash8d92e79b7940f0ac5b01bbb77737ca6c | — | |
hash95eaa3fa47a609ceefa24e8c7787bd99 | — | |
hash96ee8cc2edc8227a640cef77d4a24e83 | — | |
hashaaf34c27edfc3531cf1cf2f2e9a9c45b | — | |
hashba32f4eef7de6bae9507a63bde1a43aa | — | |
hash02a9b16a19a03e75d42d1c9c83fa4a5414ce26dc | — | |
hash05168a7a2816dc792d80f0a7c65b102b38e93bf1 | — | |
hash069a400624f2fcf69bca8a43fd52c05e95758927 | — | |
hash152b73f3e91eba572cbd8470a0f01adf363b7d64 | — | |
hash22b2333298b7cc9913c1eaf422dbe8830840d3e0 | — | |
hash2d877399e481a6ebded108631b55ff049c3316f4 | — | |
hash2e95bbf3069f603ae7ff882770f49dc36223a626 | — | |
hash46ee0aac6d64415146792c40a7f94989b5510107 | — | |
hash5160989ba4f8a75ef4e09dea0fda3bf7a2211fb7 | — | |
hash69adf42ea2216846631a85791b653b6ccbc45fb4 | — | |
hash6c4cbd259aa9d2a7f858ae607aa36da928f9268e | — | |
hash961c5cb9288292a58c3df007948dbb8e3602192d | — | |
hashc57a8ef11ec531eafd62dcb6c3ae558ea59bed08 | — | |
hashe77427eafc1ad985d83a37f68492318affaf466f | — | |
hashf836182a8a93db7985cdd67a5c1f5dbbf90bbe2a | — | |
hash1c39dbf66a362df572af7ad64164cc7d70a8875db68a710979d243760d8c027b | — | |
hash29754b61a1cce8c965bbc98efb125991b8b605dea9f3394c277092f30a109bdb | — | |
hash2a397594a3b009df342886a3480264a8773971559c79c8f95b1319eae77c55d6 | — | |
hash3bdbed482342487e08f5266e1a9b6478fcd0be645edcfb1e8c6dda1dac73cce9 | — | |
hash438dc2a85e37356eefd2d40ac7bafa8c3ad273dd36991d4b155208c3a3d460b5 | — | |
hash4abacef49032666c0d0b4a006368386bdc6c0367f6c5e21b022b650fb8dabdbc | — | |
hash52bd9e57f7db2716d2ec570bc9a5de9ba96bc620edb3ac9469b5b131b004a030 | — | |
hash7461c0f8feac69a39586c4c1ecfeb32627c5a83043721ba0144479efc0f036a1 | — | |
hash86ef39910b9361f012f889146e16b2e279a07465fe3e2f9b493ef0534a5c66c0 | — | |
hash9ae1955b9de5e4e6b23e55d2aab3230ff3a6b5c723d77a6653b2145719dc2eb6 | — | |
hashb2be07ed781bcdef614cd7c1461d81bfd8df2bc7eb11b6bfb5b202af881d727c | — | |
hashdd2c66661d94f007d87754dcbc1ace9f228785676632a39fef2ce0e26d54e206 | — | |
hashdd54e4a0220b6afbe0dbee66e32af3fe2012cc37023044a683e8e0c98579a059 | — | |
hashe5f9a505082501b32d442a3fa6a9fb40a48b7da91a5a0efc5677bed5401e0c2b | — | |
hashf3989e7cca7d17c909c5f53945c7846d2d269d32113042bf535285c4d75624e6 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip42.112.26.36 | — | |
ip63.231.92.27 | — |
Threat ID: 684585c571f4d251b54eaf44
Added to database: 6/8/2025, 12:44:53 PM
Last enriched: 7/9/2025, 12:27:07 AM
Last updated: 11/11/2025, 5:00:35 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
MediumGlassWorm Returns, Slices Back into VS Code Extensions
MediumKonni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
MediumThreatFox IOCs for 2025-11-10
MediumNine NuGet packages disrupt DBs and industrial systems with time-delayed payloads
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.