Analyzing the Link Between Two Evolving Brazilian Banking Trojans
This intelligence report examines the connection between two Brazilian banking trojans, Maverick and Coyote. The malware spreads through WhatsApp, using a multi-stage attack that begins with a malicious LNK file. Both trojans share similarities in their infection methods, targeting Brazilian users and banks. The attack chain involves obfuscated PowerShell commands, downloading additional payloads from command and control servers. The malware employs anti-analysis techniques and targets specific browsers. Persistence is achieved through a batch file in the startup folder. The report provides technical details, including code samples and infection chain analysis, as well as indicators of compromise for the identified malware campaign.
AI Analysis
Technical Summary
This intelligence report analyzes the link between two evolving Brazilian banking trojans, Maverick and Coyote, which share similar infection methodologies and target Brazilian banking users. The infection vector begins with a malicious LNK file distributed through WhatsApp messages, exploiting social engineering to trick users into execution. Upon execution, the malware runs obfuscated PowerShell commands that download additional payloads from attacker-controlled command and control (C2) servers. The malware leverages anti-analysis techniques to evade detection and targets specific browsers to intercept banking credentials. Persistence is achieved by placing a batch file in the Windows startup folder, ensuring the malware runs on system reboot. The attack chain involves multiple stages, including code injection (T1055), command execution via PowerShell (T1059.001), and obfuscation (T1027). The malware also uses network communications (T1071.001) to maintain contact with C2 infrastructure. Indicators of compromise include several file hashes, IP addresses, and domains associated with the malware campaign. Although the primary focus is on Brazilian targets, the malware’s techniques and delivery mechanisms could be adapted or inadvertently impact European organizations, especially those with business or personnel links to Brazil. No known exploits in the wild are reported, and no CVSS score is assigned, but the complexity and targeted nature suggest a medium severity threat.
Potential Impact
For European organizations, the direct impact is currently limited due to the malware’s focus on Brazilian banking users. However, organizations with subsidiaries, partners, or employees in Brazil could face indirect risks, including credential theft and financial fraud. The malware’s use of WhatsApp as a propagation vector highlights the risk of social engineering attacks exploiting popular communication platforms. If adapted to target European banks or users, the trojans could lead to significant financial losses, data breaches, and reputational damage. The multi-stage infection and persistence mechanisms increase the difficulty of detection and remediation. Additionally, the malware’s targeting of specific browsers could compromise online banking sessions and sensitive transactions. The presence of obfuscated PowerShell commands and anti-analysis techniques complicates forensic investigations and incident response. Overall, the threat underscores the need for vigilance against social engineering and multi-vector attacks in financial sectors.
Mitigation Recommendations
European organizations should implement targeted detection rules for the identified indicators of compromise, including the specific file hashes, IP addresses, domains, and URLs linked to Maverick and Coyote trojans. Monitoring and restricting the execution of LNK files received via messaging platforms like WhatsApp can reduce initial infection risk. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated PowerShell activity and suspicious batch file persistence mechanisms. Enforce strict application whitelisting policies to prevent unauthorized script execution and persistence. Conduct user awareness training focused on social engineering risks, especially related to messaging apps and unexpected file attachments. Network segmentation and monitoring of outbound connections to suspicious IPs and domains can limit malware communication with C2 servers. Regularly update and patch browsers and security software to mitigate exploitation of targeted browser vulnerabilities. Finally, implement multi-factor authentication (MFA) for banking and critical systems to reduce the impact of credential theft.
Affected Countries
Portugal, Spain, Italy, Germany, United Kingdom, France, Netherlands
Indicators of Compromise
- hash: 22fd7c48d91fd9fcda9c1c1a2b51c540
- hash: 9a514742846e3870648ae4204372a3c3
- hash: 835478d00945db56658a5f694f4ac9f5d49930db
- hash: aa29bc5cf8eaf5435a981025a73665b16abb294e
- hash: 77ea1ef68373c0dd70105dea8fc4ab41f71bbe16c72f3396ad51a64c281295ff
- hash: 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de
- ip: 109.176.30.141
- ip: 181.41.201.184
- ip: 77.111.101.169
- url: https://sorvetenopote.com
- domain: casadecampoamazonas.com
- domain: zapgrande.com
- domain: sorvetenopote.com
Analyzing the Link Between Two Evolving Brazilian Banking Trojans
Description
This intelligence report examines the connection between two Brazilian banking trojans, Maverick and Coyote. The malware spreads through WhatsApp, using a multi-stage attack that begins with a malicious LNK file. Both trojans share similarities in their infection methods, targeting Brazilian users and banks. The attack chain involves obfuscated PowerShell commands, downloading additional payloads from command and control servers. The malware employs anti-analysis techniques and targets specific browsers. Persistence is achieved through a batch file in the startup folder. The report provides technical details, including code samples and infection chain analysis, as well as indicators of compromise for the identified malware campaign.
AI-Powered Analysis
Technical Analysis
This intelligence report analyzes the link between two evolving Brazilian banking trojans, Maverick and Coyote, which share similar infection methodologies and target Brazilian banking users. The infection vector begins with a malicious LNK file distributed through WhatsApp messages, exploiting social engineering to trick users into execution. Upon execution, the malware runs obfuscated PowerShell commands that download additional payloads from attacker-controlled command and control (C2) servers. The malware leverages anti-analysis techniques to evade detection and targets specific browsers to intercept banking credentials. Persistence is achieved by placing a batch file in the Windows startup folder, ensuring the malware runs on system reboot. The attack chain involves multiple stages, including code injection (T1055), command execution via PowerShell (T1059.001), and obfuscation (T1027). The malware also uses network communications (T1071.001) to maintain contact with C2 infrastructure. Indicators of compromise include several file hashes, IP addresses, and domains associated with the malware campaign. Although the primary focus is on Brazilian targets, the malware’s techniques and delivery mechanisms could be adapted or inadvertently impact European organizations, especially those with business or personnel links to Brazil. No known exploits in the wild are reported, and no CVSS score is assigned, but the complexity and targeted nature suggest a medium severity threat.
Potential Impact
For European organizations, the direct impact is currently limited due to the malware’s focus on Brazilian banking users. However, organizations with subsidiaries, partners, or employees in Brazil could face indirect risks, including credential theft and financial fraud. The malware’s use of WhatsApp as a propagation vector highlights the risk of social engineering attacks exploiting popular communication platforms. If adapted to target European banks or users, the trojans could lead to significant financial losses, data breaches, and reputational damage. The multi-stage infection and persistence mechanisms increase the difficulty of detection and remediation. Additionally, the malware’s targeting of specific browsers could compromise online banking sessions and sensitive transactions. The presence of obfuscated PowerShell commands and anti-analysis techniques complicates forensic investigations and incident response. Overall, the threat underscores the need for vigilance against social engineering and multi-vector attacks in financial sectors.
Mitigation Recommendations
European organizations should implement targeted detection rules for the identified indicators of compromise, including the specific file hashes, IP addresses, domains, and URLs linked to Maverick and Coyote trojans. Monitoring and restricting the execution of LNK files received via messaging platforms like WhatsApp can reduce initial infection risk. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated PowerShell activity and suspicious batch file persistence mechanisms. Enforce strict application whitelisting policies to prevent unauthorized script execution and persistence. Conduct user awareness training focused on social engineering risks, especially related to messaging apps and unexpected file attachments. Network segmentation and monitoring of outbound connections to suspicious IPs and domains can limit malware communication with C2 servers. Regularly update and patch browsers and security software to mitigate exploitation of targeted browser vulnerabilities. Finally, implement multi-factor authentication (MFA) for banking and critical systems to reduce the impact of credential theft.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian-banking-trojans/"]
- Adversary
- null
- Pulse Id
- 691457292075d4131c6db0ed
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash22fd7c48d91fd9fcda9c1c1a2b51c540 | — | |
hash9a514742846e3870648ae4204372a3c3 | — | |
hash835478d00945db56658a5f694f4ac9f5d49930db | — | |
hashaa29bc5cf8eaf5435a981025a73665b16abb294e | — | |
hash77ea1ef68373c0dd70105dea8fc4ab41f71bbe16c72f3396ad51a64c281295ff | — | |
hash949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip109.176.30.141 | — | |
ip181.41.201.184 | — | |
ip77.111.101.169 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://sorvetenopote.com | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincasadecampoamazonas.com | — | |
domainzapgrande.com | — | |
domainsorvetenopote.com | — |
Threat ID: 691457ec32a6693f6a217616
Added to database: 11/12/2025, 9:48:28 AM
Last enriched: 11/12/2025, 9:56:33 AM
Last updated: 12/29/2025, 10:29:23 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
MediumThreatFox IOCs for 2025-12-28
MediumThreatFox IOCs for 2025-12-27
MediumThreatFox IOCs for 2025-12-26
MediumSilver Fox Targeting India Using Tax Themed Phishing Lures
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.