Names | Amavaldo | |
Category | Malware | |
Type | Banking trojan, Backdoor, Keylogger, Info stealer, Credential stealer | |
Description | (ESET) Most Latin American banking trojans we have analyzed connect to the C&C server and stay connected, waiting for whatever commands the server sends. After receiving a command, they execute it and wait for the next one. The commands are probably pushed manually by the attacker. You can think of this approach as a chat room where all the members react to what the admin writes. | |
Information | <https://www.welivesecurity.com/2019/08/01/banking-trojans-amavaldo/> |
Last change to this tool card: 21 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |