Grandoreiro is a banking trojan written in Delphi that was first observed in 2016 and uses a Malware-as-a-Service (MaaS) business model. Grandoreiro has confirmed victims in Brazil, Mexico, Portugal, and Spain.[1][2]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
Grandoreiro can bypass UAC by registering as the default handler for .MSC files.[2] |
Enterprise | T1087 | .003 | Account Discovery: Email Account |
Grandoreiro can parse Outlook .pst files to extract e-mail addresses.[2] |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Grandoreiro has the ability to use HTTP in C2 communications.[3][2] |
Enterprise | T1010 | Application Window Discovery |
Grandoreiro can identify installed security tools based on window names.[2] |
|
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Grandoreiro can use run keys and create link files in the startup folder for persistence.[3][2] |
.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions.[3] |
||
Enterprise | T1176 | Browser Extensions |
Grandoreiro can use malicious browser extensions to steal cookies and other user information.[3] |
|
Enterprise | T1185 | Browser Session Hijacking |
Grandoreiro can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[1][3][2] |
|
Enterprise | T1115 | Clipboard Data |
Grandoreiro can capture clipboard data from a compromised host.[3] |
|
Enterprise | T1059 | .005 | Command and Scripting Interpreter: Visual Basic |
Grandoreiro can use VBScript to execute malicious code.[1][2] |
Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers |
Grandoreiro can steal cookie data and credentials from Google Chrome.[3][2] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Grandoreiro can decrypt its encrypted internal strings.[2] |
|
Enterprise | T1189 | Drive-by Compromise |
Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer.[1][3] |
|
Enterprise | T1568 | .002 | Dynamic Resolution: Domain Generation Algorithms |
Grandoreiro can use a DGA for hiding C2 addresses, including use of an algorithm with a user-specific key that changes daily.[1][2] |
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
Grandoreiro can use SSL in C2 communication.[3] |
Enterprise | T1041 | Exfiltration Over C2 Channel |
Grandoreiro can send data it retrieves to the C2 server.[2] |
|
Enterprise | T1222 | .001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification |
Grandoreiro can modify the binary ACL to prevent security tools from running.[2] |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Grandoreiro can hook APIs, kill processes, break file system paths, and change ACLs to prevent security tools from running.[2] |
.004 | Impair Defenses: Disable or Modify System Firewall |
Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level.[2] |
||
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
Grandoreiro can delete .LNK files created in the Startup folder.[2] |
Enterprise | T1105 | Ingress Tool Transfer |
Grandoreiro can download its second stage from a hardcoded URL within the loader's code.[3][2] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging |
Grandoreiro can log keystrokes on the victim's machine.[2] |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Grandoreiro has named malicious browser extensions and update files to appear legitimate.[3][2] |
Enterprise | T1112 | Modify Registry |
Grandoreiro can modify the Registry to store its configuration at |
|
Enterprise | T1106 | Native API |
Grandoreiro can execute through the |
|
Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding |
Grandoreiro has added BMP images to the resources section of its Portable Executable (PE) file increasing each binary to at least 300MB in size.[2] |
.011 | Obfuscated Files or Information: Fileless Storage |
Grandoreiro can store its configuration in the Registry at |
||
.013 | Obfuscated Files or Information: Encrypted/Encoded File |
The Grandoreiro payload has been delivered encrypted with a custom XOR-based algorithm and also as a base64-encoded ZIP file.[1][2][2] |
||
Enterprise | T1566 | .002 | Phishing: Spearphishing Link |
Grandoreiro has been spread via malicious links embedded in e-mails.[3][2] |
Enterprise | T1057 | Process Discovery |
Grandoreiro can identify installed security tools based on process names.[2] |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections.[2][2] |
Enterprise | T1539 | Steal Web Session Cookie |
Grandoreiro can steal the victim's cookies to use for duplicating the active session from another device.[3] |
|
Enterprise | T1218 | .007 | System Binary Proxy Execution: Msiexec |
Grandoreiro can use MSI files to execute DLLs.[1] |
Enterprise | T1082 | System Information Discovery |
Grandoreiro can collect the computer name and OS version from a compromised host.[2] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Grandoreiro can determine the IP and physical location of the compromised host via IPinfo.[2] |
|
Enterprise | T1033 | System Owner/User Discovery |
Grandoreiro can collect the username from the victim's machine.[2] |
|
Enterprise | T1124 | System Time Discovery |
Grandoreiro can determine the time on the victim machine via IPinfo.[2] |
|
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Grandoreiro has used malicious links to gain execution on victim machines.[3][2] |
.002 | User Execution: Malicious File |
Grandoreiro has infected victims via malicious attachments.[3] |
||
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
Grandoreiro can detect VMWare via its I/O port and Virtual PC via the |
Enterprise | T1102 | .001 | Web Service: Dead Drop Resolver |
Grandoreiro can obtain C2 information from Google Docs.[1] |
.002 | Web Service: Bidirectional Communication |
Grandoreiro can utilize web services including Google sites to send and receive C2 data.[3][2] |