GoPix banking Trojan targeting Brazilian financial institutions
GoPix is a sophisticated banking Trojan targeting Brazilian financial institutions and cryptocurrency users. It uses memory-only implants and obfuscated PowerShell scripts to evade detection and maintain persistence. The malware spreads via malvertising campaigns on Google Ads and conducts man-in-the-middle attacks to monitor Pix transactions and Boleto slips. It leverages stolen code signing certificates and multiple obfuscation layers to bypass security controls. Victims are carefully selected, including state government financial bodies and large corporations, with delivery facilitated through legitimate anti-fraud services. GoPix employs robust cleanup mechanisms to avoid forensic analysis. The threat is currently focused on Brazil but could pose risks to entities with similar financial infrastructure. No known exploits in the wild have been reported yet. Due to its targeted nature and advanced evasion techniques, GoPix represents a medium severity threat requiring focused mitigation efforts.
AI Analysis
Technical Summary
GoPix is an advanced persistent threat (APT) banking Trojan primarily targeting Brazilian financial institutions and cryptocurrency users. It represents an evolution from previous Remote Access Trojans (RATs) and Automated Transfer Systems (ATS) malware, incorporating memory-only implants that avoid writing payloads to disk, thus reducing detection by traditional antivirus solutions. The malware uses heavily obfuscated PowerShell scripts to execute its payload and maintain stealth. Infection vectors include malvertising campaigns delivered through Google Ads, which redirect victims to malicious domains. Once inside a system, GoPix performs man-in-the-middle (MITM) attacks to intercept and monitor Pix transactions—a popular instant payment system in Brazil—and Boleto payment slips, enabling theft or manipulation of financial transactions. The malware also uses a stolen code signing certificate to appear legitimate and bypass security controls. Persistence is maintained through techniques such as registry run keys (MITRE ATT&CK T1547) and process injection (T1055). It employs multiple layers of obfuscation (T1027) and uses legitimate anti-fraud services to selectively deliver payloads to high-value targets, including state government financial bodies and large corporations. GoPix also features robust cleanup routines to remove traces post-operation, complicating incident response and forensic investigations. Despite its sophistication, no public CVE or known exploits in the wild have been reported. Indicators of compromise include specific file hashes and malicious domains used in its infrastructure. The threat leverages advanced techniques such as credential dumping (T1056.001), command and scripting interpreter abuse (T1059.001), and network communication through web services (T1102).
Potential Impact
The GoPix Trojan poses significant risks to Brazilian financial institutions and cryptocurrency users by enabling attackers to intercept and manipulate financial transactions, potentially leading to substantial financial losses and reputational damage. Its ability to perform man-in-the-middle attacks on Pix and Boleto transactions threatens the integrity and confidentiality of payment processes, undermining trust in digital financial systems. The use of memory-only implants and obfuscated scripts complicates detection and remediation, increasing dwell time and the potential for extensive data exfiltration or fraud. Targeting state government financial bodies and large corporations could disrupt critical financial operations and public services. Additionally, the Trojan’s use of stolen code signing certificates and legitimate anti-fraud services to evade detection may reduce the effectiveness of standard security measures. While currently focused on Brazil, similar financial infrastructures elsewhere could be at risk if the malware adapts or spreads. The medium severity rating reflects the targeted nature and complexity of the threat, which requires specialized detection and response capabilities.
Mitigation Recommendations
Organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting memory-only implants and anomalous PowerShell activity. Deploy behavioral analytics to identify suspicious man-in-the-middle activities, especially those targeting Pix and Boleto transaction monitoring. Regularly audit and restrict the use of PowerShell and other scripting environments, enforcing execution policies and logging all script executions. Validate code signing certificates and monitor for the use of stolen or unauthorized certificates. Employ network segmentation to isolate critical financial systems and restrict access to anti-fraud services to trusted entities only. Conduct threat hunting focused on the identified IoCs such as specific hashes and malicious domains associated with GoPix. Enhance user awareness training to recognize malvertising and phishing attempts, particularly those delivered via Google Ads. Implement multi-factor authentication (MFA) on financial systems to reduce the risk of unauthorized access. Maintain up-to-date threat intelligence feeds to monitor for emerging variants or related campaigns. Finally, establish robust incident response plans that include forensic capabilities to handle malware with cleanup routines.
Affected Countries
Brazil
Indicators of Compromise
- hash: 28c314acc587f1ea5c5666e935db716c
- hash: d3a17cb4cdba724a0021f5076b33a103
- hash: eb0b4e35a2ba442821e28d617dd2daa2
- hash: 1b1f85b68e6c9fde709d975a186185c94c0faa51
- hash: b7cfedf9346bc1a4f497396d35360c599663725d
- hash: f110d0bd7f3bd1c7b276dc78154dd21eef953384
- hash: 7ee681e494d942d7dcc399f5f81fa48cad01e41742d1882790ad4d8d115e25ca
- url: http://4a3d.com/1/
- url: http://9de1.com/1/
- url: http://b3d0.com/1/
- url: http://ef0h.com/1/
- url: http://webmensagens4bb7.com/
- url: http://yogarecap.com/1/
- url: https://correioez0ubcfht9i3.lovehomely.com/
- url: https://correiotwknx9gu315h.lovehomely.com/
- url: https://mydigitalrevival.com/get.php
- domain: 4a3d.com
- domain: 9de1.com
- domain: b3d0.com
- domain: ef0h.com
- domain: mydigitalrevival.com
- domain: paletolife.com
- domain: webmensagens4bb7.com
- domain: yogarecap.com
- domain: correioez0ubcfht9i3.lovehomely.com
- domain: correiotwknx9gu315h.lovehomely.com
GoPix banking Trojan targeting Brazilian financial institutions
Description
GoPix is a sophisticated banking Trojan targeting Brazilian financial institutions and cryptocurrency users. It uses memory-only implants and obfuscated PowerShell scripts to evade detection and maintain persistence. The malware spreads via malvertising campaigns on Google Ads and conducts man-in-the-middle attacks to monitor Pix transactions and Boleto slips. It leverages stolen code signing certificates and multiple obfuscation layers to bypass security controls. Victims are carefully selected, including state government financial bodies and large corporations, with delivery facilitated through legitimate anti-fraud services. GoPix employs robust cleanup mechanisms to avoid forensic analysis. The threat is currently focused on Brazil but could pose risks to entities with similar financial infrastructure. No known exploits in the wild have been reported yet. Due to its targeted nature and advanced evasion techniques, GoPix represents a medium severity threat requiring focused mitigation efforts.
AI-Powered Analysis
Technical Analysis
GoPix is an advanced persistent threat (APT) banking Trojan primarily targeting Brazilian financial institutions and cryptocurrency users. It represents an evolution from previous Remote Access Trojans (RATs) and Automated Transfer Systems (ATS) malware, incorporating memory-only implants that avoid writing payloads to disk, thus reducing detection by traditional antivirus solutions. The malware uses heavily obfuscated PowerShell scripts to execute its payload and maintain stealth. Infection vectors include malvertising campaigns delivered through Google Ads, which redirect victims to malicious domains. Once inside a system, GoPix performs man-in-the-middle (MITM) attacks to intercept and monitor Pix transactions—a popular instant payment system in Brazil—and Boleto payment slips, enabling theft or manipulation of financial transactions. The malware also uses a stolen code signing certificate to appear legitimate and bypass security controls. Persistence is maintained through techniques such as registry run keys (MITRE ATT&CK T1547) and process injection (T1055). It employs multiple layers of obfuscation (T1027) and uses legitimate anti-fraud services to selectively deliver payloads to high-value targets, including state government financial bodies and large corporations. GoPix also features robust cleanup routines to remove traces post-operation, complicating incident response and forensic investigations. Despite its sophistication, no public CVE or known exploits in the wild have been reported. Indicators of compromise include specific file hashes and malicious domains used in its infrastructure. The threat leverages advanced techniques such as credential dumping (T1056.001), command and scripting interpreter abuse (T1059.001), and network communication through web services (T1102).
Potential Impact
The GoPix Trojan poses significant risks to Brazilian financial institutions and cryptocurrency users by enabling attackers to intercept and manipulate financial transactions, potentially leading to substantial financial losses and reputational damage. Its ability to perform man-in-the-middle attacks on Pix and Boleto transactions threatens the integrity and confidentiality of payment processes, undermining trust in digital financial systems. The use of memory-only implants and obfuscated scripts complicates detection and remediation, increasing dwell time and the potential for extensive data exfiltration or fraud. Targeting state government financial bodies and large corporations could disrupt critical financial operations and public services. Additionally, the Trojan’s use of stolen code signing certificates and legitimate anti-fraud services to evade detection may reduce the effectiveness of standard security measures. While currently focused on Brazil, similar financial infrastructures elsewhere could be at risk if the malware adapts or spreads. The medium severity rating reflects the targeted nature and complexity of the threat, which requires specialized detection and response capabilities.
Mitigation Recommendations
Organizations should implement advanced endpoint detection and response (EDR) solutions capable of detecting memory-only implants and anomalous PowerShell activity. Deploy behavioral analytics to identify suspicious man-in-the-middle activities, especially those targeting Pix and Boleto transaction monitoring. Regularly audit and restrict the use of PowerShell and other scripting environments, enforcing execution policies and logging all script executions. Validate code signing certificates and monitor for the use of stolen or unauthorized certificates. Employ network segmentation to isolate critical financial systems and restrict access to anti-fraud services to trusted entities only. Conduct threat hunting focused on the identified IoCs such as specific hashes and malicious domains associated with GoPix. Enhance user awareness training to recognize malvertising and phishing attempts, particularly those delivered via Google Ads. Implement multi-factor authentication (MFA) on financial systems to reduce the risk of unauthorized access. Maintain up-to-date threat intelligence feeds to monitor for emerging variants or related campaigns. Finally, establish robust incident response plans that include forensic capabilities to handle malware with cleanup routines.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/gopix-banking-trojan/119173/"]
- Adversary
- GoPix
- Pulse Id
- 69b81e54cf83df8f4401d65d
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash28c314acc587f1ea5c5666e935db716c | — | |
hashd3a17cb4cdba724a0021f5076b33a103 | — | |
hasheb0b4e35a2ba442821e28d617dd2daa2 | — | |
hash1b1f85b68e6c9fde709d975a186185c94c0faa51 | — | |
hashb7cfedf9346bc1a4f497396d35360c599663725d | — | |
hashf110d0bd7f3bd1c7b276dc78154dd21eef953384 | — | |
hash7ee681e494d942d7dcc399f5f81fa48cad01e41742d1882790ad4d8d115e25ca | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://4a3d.com/1/ | — | |
urlhttp://9de1.com/1/ | — | |
urlhttp://b3d0.com/1/ | — | |
urlhttp://ef0h.com/1/ | — | |
urlhttp://webmensagens4bb7.com/ | — | |
urlhttp://yogarecap.com/1/ | — | |
urlhttps://correioez0ubcfht9i3.lovehomely.com/ | — | |
urlhttps://correiotwknx9gu315h.lovehomely.com/ | — | |
urlhttps://mydigitalrevival.com/get.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain4a3d.com | — | |
domain9de1.com | — | |
domainb3d0.com | — | |
domainef0h.com | — | |
domainmydigitalrevival.com | — | |
domainpaletolife.com | — | |
domainwebmensagens4bb7.com | — | |
domainyogarecap.com | — | |
domaincorreioez0ubcfht9i3.lovehomely.com | — | |
domaincorreiotwknx9gu315h.lovehomely.com | — |
Threat ID: 69b84bd2771bdb17491b7596
Added to database: 3/16/2026, 6:28:34 PM
Last enriched: 3/16/2026, 6:42:40 PM
Last updated: 3/16/2026, 10:36:18 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.