GBHackers

TCLBANKER Malware Leverages WhatsApp and Outlook Worm Features in Active Attacks


A sophisticated Brazilian banking trojan named TCLBANKER, deployed through a trojanized Logitech installer and capable of hijacking victims’ WhatsApp and Outlook accounts to spread itself to new targets.

The campaign, tracked as REF3076, delivers TCLBANKER through a malicious MSI installer bundled inside a ZIP file. The installer abuses a signed Logitech application, Logi AI Prompt Builder, via a DLL sideloading technique.

A malicious DLL named screen_retriever_plugin.dll masquerades as a legitimate Flutter plugin and is automatically loaded when the Logitech host application starts. Once loaded, two embedded .NET Reactor-protected payloads are deployed, a full banking trojan module and a worm module for self-propagation.

File directory contents showing a malicious DLL (Source: Elastic)

TCLBANKER Malware Leverages WhatsApp and Outlook

What makes TCLBANKER particularly evasive is its environment-dependent payload-decryption mechanism. The loader generates a three-part environment fingerprint based on anti-debugging checks, system hardware information, and language settings.

If the system is identified as a sandbox or analysis environment, the payload fails to decrypt, and execution stops silently.

The malware turns off user-mode ETW telemetry by patching EtwEventWrite with a classic xor eax, eax; ret instruction, and generates direct syscall trampolines to bypass security hooks, as reported by Elastic.


Encrypted bank/fintech/crypto domains(Source: Elastic)
Encrypted bank/fintech/crypto domains(Source: Elastic)

A comprehensive watchdog subsystem runs throughout the entire infection lifecycle, actively scanning for over a dozen analysis tools, including x64dbg, Ghidra, dnSpy, IDA Pro, Process Hacker, Frida, and CheatEngine. If any of these tools are detected, the malware terminates execution immediately.

Zip file containing TCLBANKER grabbed from the file server (Source: Elastic)
Zip file containing TCLBANKER grabbed from the file server (Source: Elastic)

The banking module targets exclusively Brazilian victims and requires at least 2 geofencing checks to match Brazil, including region code, time zone, system locale, and keyboard layout.

Every second, the malware monitors the victim’s active browser address bar using Windows UI Automation across Chrome, Firefox, Edge, Brave, Opera, and Vivaldi. It checks the URL against an encrypted list of 59 Brazilian banking, fintech, and cryptocurrency domains.

When a match is detected, a WebSocket C2 session opens to wss://mxtestacionamentos[.]com/ws, and the operator gains full remote control of the infected machine.

A WPF-based full-screen overlay framework is the malware’s most alarming capability. When activated, it covers every monitor with a borderless, topmost window that prevents the window from being closed until the operator turns it off.

Code related to filtering potential spam victim emails (Source: Elastic)
Code related to filtering potential spam victim emails (Source: Elastic)

The overlay is invisible to screen-capture tools thanks to WDA_EXCLUDEFROMCAPTURE, meaning the victim cannot seek help through screenshots. Built-in UI modules include a credential-harvesting prompt with Brazilian phone number masking, a fake Windows Update progress screen, and a vishing wait screen that keeps victims occupied.

At the same time, fraudsters call them directly, and a “cutout overlay” that exposes a real application window within the fraudulent interface to make social engineering more convincing.

The second payload, Tcl.WppBot is a dual-channel spam worm. The WhatsApp bot scans installed Chromium-based browsers for active WhatsApp Web sessions by looking for the application’s LevelDB or IndexedDB directory in each browser’s profile.

It clones the profile into a temporary directory, launches a headless Chromium instance via Selenium WebDriver, injects WPPConnect JavaScript to bypass bot detection, harvests the victim’s contacts, and silently sends phishing messages, including the TCLBANKER installer, to all Brazilian contacts without the victim’s knowledge.

The Outlook bot connects to the victim’s installed Microsoft Outlook via COM interop, harvests email contacts from the Contacts folder and the inbox message history. Then it sends phishing emails from the victim’s own email account.

Emails are sent with the subject line “NFe disponível para impressão” (Electronic Invoice Available for Printing), linking to a phishing domain impersonating a Brazilian ERP platform. Because these emails originate from trusted, legitimate accounts, they are highly likely to bypass traditional email security filters.

All C2 and payload delivery infrastructure is hosted under a single Cloudflare Workers account (ef971a42.workers[.]dev), allowing the operators to rotate infrastructure rapidly.

Developer artifacts, including debug logging paths (C:temptcl-debug.txt), test process names, and an incomplete phishing site still showing a maintenance page, suggest that REF3076 is in early operational stages and that the campaign scope is likely to expand.

Researchers link TCLBANKER to the previously tracked MAVERICK/SORVEPOTEL malware family based on shared infrastructure and code patterns.

IoC

ObservableTypeNameReference
701d51b7be8b034c860bf97847bd59a87dca8481c4625328813746964995b626SHA-256screen_retriever_plugin.dllTCLBanker loader component
8a174aa70a4396547045aef6c69eb0259bae1706880f4375af71085eeb537059SHA-256screen_retriever_plugin.dllTCLBanker loader component
668f932433a24bbae89d60b24eee4a24808fc741f62c5a3043bb7c9152342f40SHA-256screen_retriever_plugin.dllTCLBanker loader component
63beb7372098c03baab77e0dfc8e5dca5e0a7420f382708a4df79bed2d900394SHA-256XXL_21042026-181516.zipTCLBanker initial ZIP file
campanha1-api.ef971a42[.]workers.devdomain-nameTCLBanker C2
mxtestacionamentos[.]comdomain-nameTCLBanker C2
documents.ef971a42.workers[.]devdomain-nameTCLBanker file server
arquivos-omie[.]comdomain-nameTCLBanker phishing page (under development)
documentos-online[.]comdomain-nameTCLBanker phishing page (under development)
afonsoferragista[.]comdomain-nameTCLBanker phishing page (under development)
doccompartilhe[.]comdomain-nameTCLBanker phishing page (under development)
recebamais[.]comdomain-nameTCLBanker phishing page (under development)

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link