..
Click anywhere to stop
Click anywhere to stop
Detect Date | 06/28/2016 | |||||||||||||||||||||||||||||||||
Class | Trojan-Banker | |||||||||||||||||||||||||||||||||
Platform | Win32 | |||||||||||||||||||||||||||||||||
Description |
This malware family is designed to steal personal information from the clients of Brazilian banks. Methods and technologies used by this malware are generally crude. Written in Delphi or .NET, the malware uses fraudulent forms to obtain the information necessary for bypassing two-factor authentication. One example of this malware family is the Telax banking Trojan. The main Telax module is written in Delphi and is approximately 12 MB in size. The Trojan loader is written C#, with a size of under 500 KB. The Trojan is capable of performing simple commands received from the control server, such as controlling the mouse, pressing a key combination in an open window, deleting itself, and restarting the computer. Data from the user’s computer is transmitted via a POST request without encryption. Request parameters are named in Portuguese:
Top 10 countries with most attacked users (% of total attacks)
* Percentage among all unique Kaspersky users worldwide attacked by this malware |
|||||||||||||||||||||||||||||||||
Find out the statistics of the threats spreading in your region |