Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Astaroth
ID: 044a96fadc565be928d1a153f4f76ac625719
Crimeware
Banking Malware
Spyware/Stealer
Trojan
Threat types: Malware, Cybercrime, Credential theft, Banking Fraud, Latin American
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Guildma | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
Astaroth (aka Guildma) is a long-running Latin American banking trojan ecosystem characterized by modular payloads, heavy obfuscation, and extensive living-off-the-land staging using native Windows tools and scripts. Public research describes resilient configuration and delivery pivots via legitimate platforms (cloud services, GitHub/YouTube), and recent government reporting (Jan 2026) describes a WhatsApp-based propagation evolution using ZIP/LNK/HTA/VBS/MSI lures. The malware monitors banking activity and uses credential theft (including keylogging and credential tools) to enable fraud. Defenders should prioritize script and LotL abuse detections, messaging attachment hygiene, and a dynamic IOC lifecycle due to high infrastructure churn.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 | |
| T1204.002 | Malicious File | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1218.005 | Mshta | TA0005 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1027 | Obfuscated Files or Information | TA0005 |
|
| T1583.006 | Web Services | TA0042 |
|
| T1583.001 | Domains | TA0042 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.