Rewterz Threat Advisory – Apache Struts Security Updates
August 18, 2020Rewterz Threat Alert – PurpleWave—A New Infostealer from Russia
August 18, 2020Rewterz Threat Advisory – Apache Struts Security Updates
August 18, 2020Rewterz Threat Alert – PurpleWave—A New Infostealer from Russia
August 18, 2020Severity
Medium
Analysis Summary
Mekotio is a family of Latin American banking Trojans. According to researchers, one of the notable features in recent versions of Mekotio is the ability to use an SQL database as a C&C server. Either the SQL database or a protocol based on Delphi_Remote_Access_PC are used for C&C communications. Mekotio is mainly delivered in spam emails targeting victims in Latin America. Once installed on a victim system, Mekotio provides its operators with fairly typical backdoor functionality that includes being able to delete all files and folders from the Windows directory. Another interesting feature is that Mekotio disables Internet Explorer’s AutoComplete feature which forces the victim to enter their credentials and information rather than being able to use saved information. Fake popup windows are also used to extract information from victims. Some versions also hijack cryptocurrency transactions by replacing the wallet address in a transaction with one controlled by the Mekotio operators. A number of infection chains have been used by Mekotio.
Impact
- Information theft
- Exposure of sensitive data
Indicators of Compromise
SHA1
- AEA1FD2062CD6E1C0430CA36967D359F922A2EC3
- 8CBD4BE36646E98C9D8C18DA954942620E515F32
- 297C2EDE67AE6F4C27858DCB0E84C495A57A7677
- 511C7CFC2B942ED9FD7F99E309A81CEBD1228B50
- 47C3C058B651A04CA7C0FF54F883A05E2A3D0B90
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.