Javali

Javali is a banking trojan that has targeted Portuguese and Spanish-speaking countries since 2017, primarily focusing on customers of financial institutions in Brazil and Mexico.[1]

ID: S0528
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 09 November 2020
Last Modified: 22 December 2020

Techniques Used

Domain ID Name Use
Enterprise T1555 .003 从密码存储中获取凭证: Credentials from Web Browsers

Javali can capture login credentials from open browsers including Firefox, Chrome, Internet Explorer, and Edge.[1]

Enterprise T1574 .002 劫持执行流: DLL Side-Loading

Javali can use DLL side-loading to load malicious DLLs into legitimate executables.[1]

Enterprise T1059 .005 命令与脚本解释器: Visual Basic

Javali has used embedded VBScript to download malicious payloads from C2.[1]

Enterprise T1027 .001 混淆文件或信息: Binary Padding

Javali can use large obfuscated libraries to hinder detection and analysis.[1]

Enterprise T1204 .001 用户执行: Malicious Link

Javali has achieved execution through victims clicking links to malicious websites.[1]

.002 用户执行: Malicious File

Javali has achieved execution through victims opening malicious attachments, including MSI files with embedded VBScript.[1]

Enterprise T1218 .007 系统二进制代理执行: Msiexec

Javali has used the MSI installer to download and execute malicious payloads.[1]

Enterprise T1102 .001 网络服务: Dead Drop Resolver

Javali can read C2 information from Google Documents and YouTube.[1]

Enterprise T1105 输入工具传输

Javali can download payloads from remote C2 servers.[1]

Enterprise T1057 进程发现

Javali can monitor processes for open browsers and custom banking applications.[1]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Javali has been delivered as malicious e-mail attachments.[1]

.002 钓鱼: Spearphishing Link

Javali has been delivered via malicious links embedded in e-mails.[1]

References