#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

25 C
Dubai
Wednesday, November 12, 2025
HomeTopics 1Advanced Persistent ThreatMaverick Meets Coyote: Inside the Evolving Threat of Brazilian Banking Trojans

Maverick Meets Coyote: Inside the Evolving Threat of Brazilian Banking Trojans

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Brazil’s financial sector has long been a hotbed for banking trojans – malware designed to steal user credentials and hijack transactions – but a new discovery suggests these threats are evolving, merging, and getting smarter.

According to CyberProof’s recent analysis, researchers identified strong connections between two notorious trojans: Maverick and Coyote. Both target Brazilian users via malicious files shared over WhatsApp, use complex PowerShell obfuscation, and share nearly identical routines for monitoring banking applications and decrypting sensitive URLs.

The investigation began when CyberProof’s Security Operations Center (SOC) detected a suspicious file download from WhatsApp Web, a common infection vector for personal and business devices. What initially appeared as an isolated incident soon revealed a deeper web of interconnected campaigns linked to ongoing Brazilian banking malware operations.

The Anatomy of the Attack

The infection chain follows a multi-stage approach:

  1. The user downloads a seemingly harmless ZIP file via web.whatsapp.com.
  2. Inside, a disguised .lnk (shortcut) file executes obfuscated PowerShell commands.
  3. The script connects to the attacker’s command-and-control (C2) server (zapgrande[.]com) to fetch the next-stage payload.
  4. Once active, the malware disables Microsoft Defender and User Account Control (UAC), then downloads encrypted modules that steal data or hijack browser sessions.

Researchers discovered that both Maverick and Coyote use identical AES + GZIP encryption methods to decrypt targeted Brazilian banking URLs, a key clue linking the two strains. They also share code structures that check for processes tied to major banks, crypto exchanges, and even WhatsApp Web, indicating broader surveillance and credential-stealing capabilities.

Notably, Maverick’s persistence is achieved through a batch file that auto-runs at startup, coded to communicate with a second C2 domain (sorvetenopote[.]com).

A Targeted Threat to Brazilian Financial Institutions

The malware’s victimology confirms it’s laser-focused on Brazilian financial platforms, including:

  • banco.bradesco, caixa.gov.br, itau.com.br, santandernetibe.com.br, banrisul.com.br, bb.com.br, and mercadobitcoin.com.br.
  • Popular crypto trading sites such as Binance and Blockchain.com are also in the crosshairs.

Maverick first verifies whether the victim is located in Brazil before activating. If not, it self-terminates, a tactic used to avoid global detection and sandbox analysis. Once active, it communicates with attacker servers to receive commands, exfiltrate credentials, and potentially perform fileless execution using PowerShell in memory, making detection extremely challenging.

CyberProof’s analysis highlights that Maverick and Coyote may share not just techniques, but also developers or operational control, suggesting an evolution from isolated malware projects into coordinated cybercrime ecosystems.

Why It Matters Globally, and in the MEA Region

While the current wave targets Brazil, this kind of modular banking malware has a history of crossing borders. Once attackers validate techniques locally, they often retool them for other markets, including the Middle East and Africa, where mobile banking adoption is rising rapidly.

With many GCC and African banks expanding digital services, similar attacks could emerge, leveraging messaging apps like WhatsApp or Telegram as infection vectors. As these apps blur personal and business communications, the risk extends from individual users to enterprise endpoints.

10 Best Practices for Defenders

To mitigate risks from trojans like Maverick and Coyote, security teams should:

  1. Educate employees about malicious attachments and links — especially from messaging platforms. (Cybersecurity training)
  2. Restrict file downloads from personal communication channels on corporate networks.
  3. Monitor PowerShell activity for obfuscated or encoded commands.
  4. Enforce endpoint protection policies that block unsigned scripts and suspicious processes.
  5. Deploy behavioral detection tools that flag abnormal use of cmd.exe and powershell.exe.
  6. Segment networks to isolate infected endpoints quickly.
  7. Apply strict access controls for data transfers and USB devices.
  8. Leverage threat intelligence feeds (such as Saintynet Cybersecurity) to track emerging banking malware IOCs.
  9. Regularly patch systems and browsers to eliminate vulnerabilities exploited by loaders.
  10. Conduct simulated phishing and infection response drills to strengthen SOC readiness.

The Bigger Picture

Maverick and Coyote are part of a larger pattern, banking trojans becoming more modular, stealthy, and collaborative. As AI-driven automation enters the attacker’s toolkit, analysts predict more sophisticated versions could surface, blending information-stealing, ransomware, and even social engineering functions.

According to CyberProof, the overlap between these two malware families underscores the growing industrialization of cybercrime, where shared codebases and tools are traded across underground ecosystems.

For security professionals in Brazil and beyond, the message is clear: malware doesn’t stay local for long. Strengthening defenses now – from endpoint visibility to user awareness -is key to staying ahead of evolving threats.

Conclusion

The link between Maverick and Coyote represents more than just shared code, it’s a sign that financial malware operations are maturing, combining stealth, social engineering, and technical innovation.

Organizations worldwide, particularly across emerging digital economies like the Middle East and Africa, must recognize this evolution and respond with equally adaptive security strategies.

Stay informed, stay resilient, and invest in continuous cybersecurity training, because the next variant could already be in development.

Source: CyberProof – “Analyzing the Link Between Two Evolving Brazilian Banking Trojans”

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here