Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

GoPix banking Trojan targeting Brazilian financial institutions

0
Medium
Published: Mon Mar 16 2026 (03/16/2026, 15:14:28 UTC)
Source: AlienVault OTX General

Description

GoPix is a sophisticated banking Trojan targeting Brazilian financial institutions and cryptocurrency users. It uses memory-only implants and obfuscated PowerShell scripts to evade detection and maintain persistence. The malware spreads via malvertising campaigns on Google Ads and conducts man-in-the-middle attacks to monitor Pix transactions and Boleto slips. It leverages stolen code signing certificates and multiple obfuscation layers to bypass security controls. Victims are carefully selected, including state government financial bodies and large corporations, with delivery facilitated through legitimate anti-fraud services. GoPix employs robust cleanup mechanisms to avoid forensic analysis. The threat is currently focused on Brazil but could pose risks to entities with similar financial infrastructure. No known exploits in the wild have been reported yet. Due to its targeted nature and advanced evasion techniques, GoPix represents a medium severity threat requiring focused mitigation efforts.

AI-Powered Analysis

AILast updated: 03/16/2026, 18:42:40 UTC

Technical Analysis

GoPix is an advanced persistent threat (APT) banking Trojan primarily targeting Brazilian financial institutions and cryptocurrency users. It represents an evolution from previous Remote Access Trojans (RATs) and Automated Transfer Systems (ATS) malware, incorporating memory-only implants that avoid writing payloads to disk, thus reducing detection by traditional antivirus solutions. The malware uses heavily obfuscated PowerShell scripts to execute its payload and maintain stealth. Infection vectors include malvertising campaigns delivered through Google Ads, which redirect victims to malicious domains. Once inside a system, GoPix performs man-in-the-middle (MITM) attacks to intercept and monitor Pix transactions—a popular instant payment system in Brazil—and Boleto payment slips, enabling theft or manipulation of financial transactions. The malware also uses a stolen code signing certificate to appear legitimate and bypass security controls. Persistence is maintained through techniques such as registry run keys (MITRE ATT&CK T1547) and process injection (T1055). It employs multiple layers of obfuscation (T1027) and uses legitimate anti-fraud services to selectively deliver payloads to high-value targets, including state government financial bodies and large corporations. GoPix also features robust cleanup routines to remove traces post-operation, complicating incident response and forensic investigations. Despite its sophistication, no public CVE or known exploits in the wild have been reported. Indicators of compromise include specific file hashes and malicious domains used in its infrastructure. The threat leverages advanced techniques such as credential dumping (T1056.001), command and scripting interpreter abuse (T1059.001), and network communication through web services (T1102).

Potential Impact

The GoPix Trojan poses significant risks to Brazilian financial institutions and cryptocurrency users by enabling attackers to intercept and manipulate financial transactions, potentially leading to substantial financial losses and reputational damage. Its ability to perform man-in-the-middle attacks on Pix and Boleto transactions threatens the integrity and confidentiality of payment processes, undermining trust in digital financial systems. The use of memory-only implants and obfuscated scripts complicates detection and remediation, increasing dwell time and the potential for extensive data exfiltration or fraud. Targeting state government financial bodies and large corporations could disrupt critical financial operations and public services. Additionally, the Trojan’s use of stolen code signing certificates and legitimate anti-fraud services to evade detection may reduce the effectiveness of standard security measures. While currently focused on Brazil, similar financial infrastructures elsewhere could be at risk if the malware adapts or spreads. The medium severity rating reflects the targeted nature and complexity of the threat, which requires specialized detection and response capabilities.

Mitigation Recommendations

Organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting memory-only implants and anomalous PowerShell activity. Deploy behavioral analytics to identify suspicious man-in-the-middle activities, especially those targeting Pix and Boleto transaction monitoring. Regularly audit and restrict the use of PowerShell and other scripting environments, enforcing execution policies and logging all script executions. Validate code signing certificates and monitor for the use of stolen or unauthorized certificates. Employ network segmentation to isolate critical financial systems and restrict access to anti-fraud services to trusted entities only. Conduct threat hunting focused on the identified IoCs such as specific hashes and malicious domains associated with GoPix. Enhance user awareness training to recognize malvertising and phishing attempts, particularly those delivered via Google Ads. Implement multi-factor authentication (MFA) on financial systems to reduce the risk of unauthorized access. Maintain up-to-date threat intelligence feeds to monitor for emerging variants or related campaigns. Finally, establish robust incident response plans that include forensic capabilities to handle malware with cleanup routines.

Affected Countries

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/gopix-banking-trojan/119173/"]
Adversary
GoPix
Pulse Id
69b81e54cf83df8f4401d65d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash28c314acc587f1ea5c5666e935db716c
hashd3a17cb4cdba724a0021f5076b33a103
hasheb0b4e35a2ba442821e28d617dd2daa2
hash1b1f85b68e6c9fde709d975a186185c94c0faa51
hashb7cfedf9346bc1a4f497396d35360c599663725d
hashf110d0bd7f3bd1c7b276dc78154dd21eef953384
hash7ee681e494d942d7dcc399f5f81fa48cad01e41742d1882790ad4d8d115e25ca

Url

ValueDescriptionCopy
urlhttp://4a3d.com/1/
urlhttp://9de1.com/1/
urlhttp://b3d0.com/1/
urlhttp://ef0h.com/1/
urlhttp://webmensagens4bb7.com/
urlhttp://yogarecap.com/1/
urlhttps://correioez0ubcfht9i3.lovehomely.com/
urlhttps://correiotwknx9gu315h.lovehomely.com/
urlhttps://mydigitalrevival.com/get.php

Domain

ValueDescriptionCopy
domain4a3d.com
domain9de1.com
domainb3d0.com
domainef0h.com
domainmydigitalrevival.com
domainpaletolife.com
domainwebmensagens4bb7.com
domainyogarecap.com
domaincorreioez0ubcfht9i3.lovehomely.com
domaincorreiotwknx9gu315h.lovehomely.com

Threat ID: 69b84bd2771bdb17491b7596

Added to database: 3/16/2026, 6:28:34 PM

Last enriched: 3/16/2026, 6:42:40 PM

Last updated: 3/16/2026, 10:36:18 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses