Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Grandoreiro
ID: 6d0bd1b0d6daf2b370bd8371bb41ae1353025
Crimeware
Banking Malware
Threat types: Malware, Cybercrime, Malware-as-a-Service, Banking Trojan, Financial Fraud
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Delephant | Tetrade | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: high
Grandoreiro is a long-running Latin American banking trojan ecosystem used for direct financial fraud. Public reporting describes phishing-driven delivery and multi-component payloads, followed by on-host interaction capabilities (keylogging, mouse simulation, screen sharing/control, and deceptive pop-ups) that enable account takeover and unauthorized transfers. 2024 analyses describe infrastructure churn and DGA-driven domain rotation, and law enforcement reporting describes laundering via mule networks. Defensive focus should prioritize phishing prevention, application control on finance endpoints, behavior-first hunting for input capture/overlay/control capabilities, and a dynamic IOC lifecycle with first_seen/last_seen.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 | |
| T1204.002 | Malicious File | TA0002 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1564.002 | Hidden Users | TA0005 |
|
| T1113 | Screen Capture | TA0009 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1568.002 | Domain Generation Algorithms | TA0011 |
|
| T1098.001 | Additional Cloud Credentials | TA0003 TA0004 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.