Cybersecurity threat hunters have identified and flagged a new, previously undocumented Brazilian banking trojan, dubbed TCLBANKER, which exhibits a disturbing level of sophistication in its design and operation. This potent malware is capable of targeting an extensive list of 59 distinct banking, fintech, and cryptocurrency platforms, signaling a significant escalation in the regional cybercrime landscape. Elastic Security Labs, the cybersecurity research arm that brought this threat to light, is tracking its activities under the internal moniker REF3076, highlighting the distinct nature of this campaign.
The emergence of TCLBANKER is not an isolated event but rather marks a notable evolution within a known threat cluster. Researchers assess this new malware family to be a major update and successor to "Maverick," an earlier banking trojan that gained notoriety for its leveraging of a worm component, "SORVEPOTEL," to spread aggressively via WhatsApp Web to victims’ contacts. The campaign associated with Maverick has previously been attributed to a persistent threat cluster that cybersecurity firm Trend Micro has designated as "Water Saci," underscoring a consistent and evolving adversary group behind these attacks. This lineage suggests a continued investment in developing more robust and elusive tools by these cybercriminals, posing an increasing challenge to financial institutions and individual users alike.
The Sophisticated Attack Chain Unveiled
At the heart of the TCLBANKER attack chain lies a multi-layered loader, engineered with robust anti-analysis capabilities designed to thwart detection by security tools and researchers. This loader is responsible for deploying two embedded modules critical to the trojan’s functionality: a full-featured banking trojan component dedicated to financial fraud, and an aggressive worm component tailored for widespread propagation across popular communication platforms like WhatsApp and Microsoft Outlook.
The initial vector for infection typically involves a malicious MSI installer, meticulously bundled within a ZIP file. Security researchers Jia Yu Chan, Daniel Stepanic, Seth Goodwin, and Terrance DeJesus from Elastic Security Labs detailed this process, explaining that "These MSI installer packages are abusing a signed Logitech program called Logi AI Prompt Builder." This technique, known as DLL side-loading, is a particularly insidious method of initial compromise. By exploiting a legitimate, signed application, the attackers lend an air of authenticity to their malicious payload, making it harder for conventional security measures to flag the initial execution as suspicious.
Upon successful execution, the malware leverages DLL side-loading against the legitimate Logitech application. Instead of loading the intended library, the Logitech program is tricked into launching a malicious DLL, specifically identified as "screen_retriever_plugin.dll." This malicious DLL acts as the primary loader for TCLBANKER, but it does so with extreme caution. It incorporates a "comprehensive watchdog subsystem" that continuously monitors the execution environment for any signs of analysis tools. This includes actively scanning for sandboxes, debuggers, disassemblers, instrumentation tools, and even antivirus software. The objective is clear: to sidestep detection and analysis by security researchers, allowing the malware to operate undetected for as long as possible.
Evasion and Persistence: A Battle of Wits
The developers of TCLBANKER have invested heavily in evasion techniques, demonstrating a sophisticated understanding of modern cybersecurity defenses. The malicious "screen_retriever_plugin.dll" is programmed to be highly selective about its execution environment. It will only proceed if it determines it was loaded by either "logiaipromptbuilder.exe" (the legitimate Logitech program it abuses) or "tclloader.exe" (likely a specialized executable used by the attackers during development or testing). This specific check further complicates analysis, as researchers often try to load malware in isolated environments without its intended parent process.
Beyond selective execution, TCLBANKER also employs advanced anti-forensics techniques to disable endpoint security software. It actively removes any usermode hooks placed by endpoint detection and response (EDR) solutions within "ntdll.dll" by replacing the library. Ntdll.dll is a critical Windows system library, and interfering with it can disable security monitoring. Furthermore, the malware disables Event Tracing for Windows (ETW) telemetry, a powerful diagnostic and logging framework used by many security tools to collect system activity data. By crippling these essential monitoring capabilities, TCLBANKER significantly reduces its footprint and increases its chances of evading sophisticated EDR and antivirus solutions.
A crucial layer of defense for the malware itself is its unique fingerprinting mechanism. TCLBANKER generates three distinct fingerprints based on a series of checks: anti-debugging and anti-virtualization detections, system disk information analysis, and language checks. These fingerprints are then combined to create a unique environment hash value. This hash serves a critical purpose: it is used to decrypt the embedded payload of the banking trojan. Significantly, the system language check specifically ensures that the user’s default language is Brazilian Portuguese.

Elastic Security Labs elaborated on this ingenious defense: "For example, if a debugger is present, it will produce an incorrect hash, so when the malware attempts to derive the decryption keys from the hash, the payload will not decrypt correctly, and TCLBANKER will stop executing." This mechanism effectively acts as a kill switch, preventing the malware from revealing its full capabilities in an analyst’s lab or a non-Brazilian target environment, thereby preserving its secrecy and operational longevity. Only when all environmental conditions are met and the correct hash is generated will the true banking trojan payload be decrypted and launched.
Once these rigorous checks are passed, the main banking trojan component is launched. This component performs one final verification, ensuring it is indeed running on a Brazilian system. Having established its preferred operational environment, it then proceeds to establish persistence on the compromised machine, typically by creating a scheduled task. This ensures the malware can automatically restart itself even after system reboots, maintaining a foothold on the victim’s device. Subsequently, TCLBANKER initiates communication with its external command-and-control (C2) server, sending an HTTP POST request containing basic system information, thereby signaling its readiness for further instructions from the operators.
Targeting and Data Theft: The Banking Trojan’s Modus Operandi
TCLBANKER incorporates a self-update mechanism, allowing its operators to push new functionalities or adapt to evolving security defenses. More critically, it features a sophisticated URL monitor. This component actively extracts the current URL from the foreground browser’s address bar, leveraging Windows UI Automation. This technique is highly effective as it doesn’t rely on browser-specific injection methods, making it compatible with a wide array of popular web browsers, including Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Vivaldi.
The extracted URL is then matched against a hard-coded list of targeted financial institutions. This list encompasses not only traditional banks but also a growing number of fintech platforms and cryptocurrency exchanges, reflecting the diversification of financial services and the criminal opportunism that follows. If a match is detected, TCLBANKER establishes a real-time WebSocket connection to its remote server. This connection enables a command dispatch loop, allowing the operator to perform a broad range of malicious tasks directly on the victim’s machine. These tasks can include initiating fraudulent transactions, collecting sensitive financial data, manipulating browser sessions, and dynamically adapting social engineering tactics.
To conduct data theft, TCLBANKER relies on an advanced Windows Presentation Foundation (WPF)-based full-screen overlay framework. This framework allows the trojan to conduct highly convincing social engineering attacks. It can display realistic credential harvesting prompts, create "vishing wait screens" to trick users into divulging information over the phone, present bogus progress bars to distract victims, and even simulate fake Windows Updates. All these deceptive overlays are designed to appear legitimate and are strategically positioned to hide the malicious activity from screen capture tools, preventing the victim or security software from easily documenting the fraud unfolding. The use of WPF ensures a native, high-quality visual presentation that is difficult for an average user to distinguish from legitimate system prompts or banking interfaces.
Exploiting Trust: The Worm Component’s Reach
In tandem with its data theft capabilities, TCLBANKER’s loader invokes a powerful worming module, designed to propagate the trojan at scale through spam and phishing messages. This module employs a two-pronged approach, leveraging widely used communication channels to maximize its reach.
The first prong is a WhatsApp Web worm, a technique previously observed in the SORVEPOTEL malware, which TCLBANKER enhances. This worm hijacks authenticated WhatsApp Web browser sessions, exploiting the trust inherent in personal communications. It retrieves a messaging template from the command-and-control server, ensuring dynamic and up-to-date phishing lures. Leveraging the open-source project WPPConnect, which provides an API for WhatsApp, the worm automates the sending of these malicious messages to the victim’s contacts. Crucially, it incorporates filtering mechanisms, deliberately avoiding group chats, broadcast lists, and numbers that are not identified as Brazilian. This targeted approach increases the likelihood of successful infection by focusing on individual, relevant contacts within the geographical target region, making the messages appear more personal and therefore more trustworthy. Given WhatsApp’s immense popularity in Brazil, with over 120 million users, this propagation method grants TCLBANKER an exceptionally wide and effective distribution channel.
The second prong of the worming module is an Outlook email bot. This component abuses the victim’s installed Microsoft Outlook application to send phishing emails directly from the victim’s email address. This method is particularly effective because emails originating from a known contact bypass many traditional spam filters that rely on reputation-based defenses. The recipient, seeing an email from a trusted source, is far more likely to open it and click on malicious links or attachments. This "illusion of trust" is a powerful social engineering tactic, turning the victim’s own communication channels into vectors for further compromise. The seamless integration with Outlook, a staple in many professional and personal environments, further expands the potential reach of TCLBANKER beyond casual messaging apps.
The Brazilian Cybercrime Landscape: A Maturing Ecosystem

The emergence of TCLBANKER, with its sophisticated technical features and multi-vector propagation, reflects a broader maturation occurring across the Brazilian banking trojan ecosystem. Historically, while Brazilian malware families have been prolific, they were often considered less technically advanced than those originating from Eastern Europe or other major cybercrime hubs. However, this distinction is rapidly blurring.
As Elastic Security Labs aptly concluded, "Techniques that were once the hallmark of more sophisticated threat actors: environment-gated payload decryption, direct syscall generation, real-time social engineering orchestration over WebSocket, are now being packaged into commodity crimeware." This statement highlights a worrying trend: advanced evasion and operational tactics are becoming democratized, accessible to a wider range of criminal groups. The ability to perform environment-gated payload decryption, as seen with TCLBANKER’s hash-based execution, or to engage in direct syscall generation (a technique that bypasses user-mode API calls, making detection harder) signifies a significant leap in the technical prowess of these adversaries. The use of WebSockets for real-time social engineering orchestration allows for highly dynamic and adaptive attacks, where operators can respond instantaneously to victim interactions, making their lures even more convincing.
Brazil has long been a hotspot for banking malware due to a combination of factors, including a large and digitally active population, a sophisticated banking sector, and a vibrant underground cybercrime economy. Past notable Brazilian banking trojans like Grandoreiro, Javali, and Guildma have paved the way, continually evolving their methods. TCLBANKER represents the next stage in this evolution, incorporating lessons learned and adopting advanced techniques previously reserved for state-sponsored or highly resourced criminal organizations.
Implications for Financial Security and Users
The capabilities of TCLBANKER pose significant implications for financial security and individual users. For financial institutions, the challenge lies in detecting a threat that actively disables security telemetry, abuses legitimate software, and employs real-time, highly customized social engineering overlays. Traditional signature-based detection is increasingly insufficient against such polymorphic and evasive threats. The ability of the worm component to bypass email gateways and reputation-based defenses by leveraging compromised legitimate accounts means that standard perimeter security measures are "ill-equipped to catch" these infections, as Elastic noted. This necessitates a shift towards more advanced behavioral analytics, robust endpoint detection and response (EDR) solutions, and proactive threat hunting.
For individual users, the risks are substantial. TCLBANKER’s ability to target 59 different platforms means a vast array of online financial activities are vulnerable. The social engineering tactics are designed to be extremely convincing, making it difficult for even tech-savvy users to distinguish between legitimate and malicious prompts. The propagation via WhatsApp and Outlook leverages the trust users place in their contacts, turning friends and colleagues into unwitting spreaders of malware. The financial consequences for victims can range from direct monetary theft to long-term identity compromise.
To mitigate these risks, users are urged to exercise extreme caution with unsolicited messages and links, even those from known contacts. Verifying suspicious requests through alternative channels (e.g., calling the contact directly) is crucial. Maintaining up-to-date operating systems and security software, using strong and unique passwords, enabling multi-factor authentication (MFA) on all financial accounts, and regularly backing up data are fundamental defensive practices. Additionally, being aware of the tactics used by banking Trojans, such as unexpected pop-ups or requests for sensitive information, can help users identify and avoid becoming victims.
Looking Ahead: The Ongoing Fight Against Financial Cybercrime
The rise of TCLBANKER underscores the relentless innovation within the cybercrime community, particularly in regions like Brazil where financial fraud is a lucrative endeavor. The observed "maturation" means that the line between sophisticated state-level threats and commodity crimeware is blurring, making the cybersecurity landscape increasingly challenging. As these advanced techniques become more widespread, the burden on security researchers, financial institutions, and individual users to adapt and evolve their defenses grows heavier. The fight against financial cybercrime is an ongoing arms race, and TCLBANKER serves as a stark reminder of the evolving threats that demand continuous vigilance and proactive defense strategies. The insights provided by Elastic Security Labs are critical for the broader cybersecurity community to understand, track, and ultimately counter these sophisticated new generations of banking Trojans.
