Trojan Saefko compiles a victim’s profile and can spread via USB devices

Zscaler analysts noticed that on the darknet started sales a new multifunctional Saefko trojan, written in .NET, which steals bank details, credentials, as well as information about cryptocurrency wallets.

Having penetrated the system, the Trojan will unpack itself in AppData and will enter into autorun to preserve a constant presence in the system, loading every time the infected machine is restarted.

Saefko then carefully checks the internet connection and extracts information from the Google Chrome browser to make a list of data suitable for theft.

Additionally, malware has a long and specific list of what it is desirable to learn about the victim and whatto transfer to the management server. Saefko is interested in data stored in Chrome, especially about visits to financial sites, social media, information about cryptocurrencies, games and much more.

Read also: Vulnerabilities in more than 40 drivers affect all PCs running Windows 10

For example, the trojan will check the logs for many sites, including PayPal, Amazon, Bitpay, Mastercard, Steam, Twitch, GameStop, Microsoft, YouTube, Capital, Bitstamp, Facebook, Instagram and Gmail Google.

Separately, the malware is interested in whether the victim uses large trading platforms (Boohoo, Superdry, Macy’s, Target and Alibaba), and whether the victim is of “commercial value” (LinkedIn, Financial Times, Investing.com, Reuters and Zacks are checked for this).

“Malicious program compiles a very detailed user profile, evaluating account of bank card, possession of cryptocurrency, game activity, activity on Instagram, Facebook, YouTube, Google+ and Gmail, as well as purchasing activity and “business value”, – experts of Zscaler claim.

All the collected information is transmitted to the management server, and on its basis malware operators give Saefko a “green light” for the further development of the attack, activating four different modules: HTTPClinet, IRCHelper, KEYLogger and StartLocalServices (for distribution via USB).

As it’s easy to understand by the names of the modules, they are intended to collect additional data, intercept keystrokes, and also search for removable drives and network drives (the malware will be copied to any detected USB drives). Also, the Trojan can connect to the IRC server for various instructions (including downloading files, executing commands, opening URLs, sending system information, taking screenshots, receiving data about the system’s location or deleting itself).

Interestingly, at the end of their report, Zscaler experts noted that at one of the hacker forums they managed to find ads for a hacked version of Saefko RAT suitable for Windows and Android.

How to protect your system?

To protect systems from RATs, users must refrain from downloading programs or opening attachments that aren’t from a trusted source. At the administrative level, it’s always a good idea to block unused ports, turn off unused services, and monitor outgoing traffic. Attackers are often careful to prevent the malware from doing too much activity at once, which would slow down the system and possibly attract the attention of the user and IT.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending