New TCLBANKER Trojan Targets Brazilian Financial Platforms

New TCLBANKER Trojan Targets Brazilian Financial Platforms

Malik Haidar stands as a seasoned veteran in the high-stakes arena of corporate cybersecurity, where he has spent years shielding multinational corporations from sophisticated state-sponsored and criminal hacking groups. With a background that seamlessly blends deep technical analytics with strategic business intelligence, he has a unique vantage point on how modern threats evolve from simple scripts into modular, resilient weapons. Today, Malik joins us to dissect the emergence of TCLBANKER, a formidable Brazilian banking trojan that has recently begun targeting nearly sixty financial platforms. Our conversation dives into the intricate mechanics of this threat, exploring its use of legitimate software to hide in plain sight, its environment-locked decryption protocols, and the clever way it weaponizes personal trust through hijacked communication apps to facilitate its spread.

When an installer leverages a signed utility for DLL side-loading, how does this bypass standard endpoint defenses? Please explain the technical steps used to scrub usermode hooks and disable system telemetry during the initial infection phase to ensure the malware remains hidden from antivirus software.

The brilliance of this attack lies in its exploitation of “Logi AI Prompt Builder,” a perfectly legitimate, signed executable from Logitech that most security tools are conditioned to trust. By placing a malicious file named “screen_retriever_plugin.dll” in the same directory, the malware tricks the trusted application into loading the threat as if it were a standard component. Once inside, the loader doesn’t just hide; it actively blinds the system by targeting “ntdll.dll,” the core library where antivirus software typically places its “hooks” to watch for suspicious behavior. The malware replaces the library to scrub those hooks clean and shuts down Event Tracing for Windows, effectively turning off the system’s internal sirens. This creates a silent environment where the malware can operate without leaving the digital footprints that traditional security telemetry relies on to catch an intruder.

Loaders often use specific system fingerprints, such as language settings or disk info, to generate decryption keys for their payloads. How does environment-gating prevent analysis by security researchers, and what specific hurdles does it create for automated sandboxes that are unable to generate the correct decryption hash?

Environment-gating acts like a biological lock that only opens when the malware “senses” it is in the right host. In the case of TCLBANKER, the loader generates a unique hash based on three specific pillars: anti-debugging checks, system disk information, and a language check to ensure the victim is using Brazilian Portuguese. If a security researcher runs this in a generic sandbox or a debugger, the system generates an incorrect hash, and the decryption process produces nothing but garbled data. It is incredibly frustrating for an analyst because the payload remains an unreadable mess of encrypted bytes unless you can perfectly replicate the victim’s exact hardware and regional profile. This “triple-lock” mechanism ensures that the banking trojan stays dormant and invisible to the very automated tools designed to tear it apart.

Hijacking active WhatsApp and Outlook sessions allows malware to spread through a victim’s trusted contacts. What makes these worming components more effective than traditional phishing emails, and how do they automate message delivery to thousands of contacts while specifically targeting certain regional numbers or ignoring group chats?

Traditional phishing relies on the victim trusting a stranger or a brand, but session hijacking relies on the victim trusting a friend, which is a far more powerful psychological lever. By using the WPPConnect project to automate WhatsApp Web and abusing the local Outlook application, the malware can blast the infection out to as many as 3,000 contacts directly from the victim’s own account. It’s a surgical approach where the script is programmed to ignore group chats and broadcasts, focusing instead on individual regional Brazilian numbers to maximize the hit rate. Because the messages come through legitimate, authenticated sessions, they completely bypass spam filters and reputation-based defenses that would normally flag a suspicious external link. There is a chilling efficiency in seeing a trusted contact send you a “recommended” installer that is actually a digital predator.

Modern trojans utilize real-time URL monitoring and WebSocket connections to deploy social engineering overlays. How do these full-screen frameworks mimic legitimate windows or updates to harvest credentials, and what techniques allow them to remain invisible to screen capture tools while the operator takes remote control?

The social engineering component is terrifyingly immersive, utilizing a Windows Presentation Foundation framework to launch full-screen overlays that are indistinguishable from real system prompts. While the malware monitors the address bars of six major browsers like Chrome and Edge, it waits for a match with one of 59 targeted financial platforms before springing into action. It can serve up fake Windows Update screens or “security” progress bars that keep the user occupied while the attacker uses a WebSocket connection to control the mouse and keyboard in the background. Perhaps most impressive is its ability to remain invisible to standard screen capture tools; while the operator has a clear view of the victim’s desktop, the security software’s logs might only show a blank screen or a legitimate process. This allows the attacker to harvest credentials and manipulate the session in real-time without the user—or their security software—realizing that the interface they are looking at is a complete fabrication.

Sophisticated techniques like direct syscall generation and environment-gated decryption are becoming standard in regional banking malware. How has the complexity of these attacks changed the way organizations must approach threat hunting, and what are the most reliable indicators of a compromise when legitimate applications are being abused?

We are witnessing a “trickle-down” effect where high-end espionage techniques are being integrated into common crimeware, forcing organizations to move away from simple file-scanning and toward behavioral monitoring. Since these trojans abuse legitimate infrastructure like Logitech utilities and Outlook, a “clean” file signature no longer guarantees safety. Threat hunters must now look for subtle anomalies, such as an authenticated user suddenly attempting to message 3,000 contacts in a matter of minutes or a signed process making unexpected WebSocket connections to unknown servers. The most reliable indicators often lie in the persistence mechanisms, like suspicious scheduled tasks, and the extraction of browser data through UI Automation, which are actions that no standard utility should be performing. It requires a shift in mindset from “Is this file bad?” to “Is this trusted application acting out of character?”

What is your forecast for the evolution of banking trojans and their propagation methods?

My forecast is that we will see a rapid transition toward “living-off-the-trust” models, where malware becomes increasingly parasitic on the communication apps we use daily. As MFA and traditional email security improve, attackers will double down on hijacking established sessions in platforms like WhatsApp, Slack, or Teams, because the human element remains the weakest link in the chain. We should expect these trojans to become even more regionally focused but technically modular, allowing them to pivot from one country’s banking infrastructure to another with minimal code changes. The “commodity” nature of this sophisticated code means that even lower-tier criminal groups will soon be wielding tools that can bypass usermode hooks and blind telemetry, making the digital landscape much more volatile for financial institutions and their customers alike.

subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address