JanelaRAT: Latin American Cyber Threat Targeting Financial Data

By — min read
<article> <h2>Introduction</h2> <p>JanelaRAT, named after the Portuguese word for 'window,' is a sophisticated malware family designed to steal financial and cryptocurrency information from users in Latin America. Active since June 2023, this Trojan is a modified version of BX RAT, featuring a unique title bar detection mechanism that identifies target banking websites in a victim's browser. Threat actors behind JanelaRAT continuously update its infection chains and capabilities, making it a persistent and evolving danger.</p><figure style="margin:20px 0"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/04/13084332/janelarat-featured-image.jpg" alt="JanelaRAT: Latin American Cyber Threat Targeting Financial Data" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: securelist.com</figcaption></figure> <h2 id="background">Background</h2> <p>JanelaRAT specifically targets financial institutions and cryptocurrency platforms in Latin America. Its key differentiator from BX RAT is the custom title bar detection, which allows it to activate malicious actions only when the user visits a predefined website. This selective behavior helps evade detection. Kaspersky solutions identify JanelaRAT as <strong>Trojan.Script.Generic</strong> and <strong>Backdoor.MSIL.Agent.gen</strong>.</p> <h2 id="infection-chain">Infection Chain</h2> <h3>Initial Vector</h3> <p>Campaigns begin with phishing emails that mimic pending invoice notifications. The email contains a malicious link that downloads a PDF file, but in reality redirects victims to a malicious website hosting a compressed archive. The archive typically includes VBScripts, XML files, additional ZIP archives, and BAT files. These components work together to eventually download a ZIP containing the final JanelaRAT payload, delivered via <strong>DLL sideloading</strong>.</p> <h3>Multi-Stage Process</h3> <p>The infection chain is multi-stage. The user clicks a link, downloads a PDF-like file, then is redirected to download a compressed archive. The archive unpacks scripts and configuration files that orchestrate the download of a second-stage ZIP. This ZIP contains a legitimate executable and a malicious DLL—the JanelaRAT backdoor. The executable sideloads the DLL, executing the malware.</p> <h3>Evolution of the Infection Chain</h3> <p>Over time, the threat actors have streamlined the process. Earlier versions used more steps, but the latest observed campaign integrates <strong>MSI files</strong> as an initial dropper. This MSI file directly delivers a legitimate PE32 executable and a DLL that is actually JanelaRAT. This reduces the number of steps and helps evade analysis. Additionally, auxiliary files like configuration files have been observed to change frequently, indicating an ongoing effort to adapt detection avoidance methods.</p><figure style="margin:20px 0"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/04/13084332/janelarat-featured-image-800x450.jpg" alt="JanelaRAT: Latin American Cyber Threat Targeting Financial Data" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: securelist.com</figcaption></figure> <h2 id="technical-details">Technical Details</h2> <h3>Initial Dropper (MSI File)</h3> <p>The MSI file acts as the first stage. It obfuscates file paths and names to hinder analysis. It uses ActiveX objects to manipulate the file system and execute malicious commands. The dropper defines paths using environment variables to place binaries, creates a startup shortcut for persistence, and stores a first-run indicator file. It checks for the existence of this indicator and a specific path; if either is missing, it proceeds with installation.</p> <h3>Persistence Mechanism</h3> <p>Persistence is achieved through a shortcut placed in the Windows startup folder. The malware ensures it runs every time the system boots. The first-run indicator file prevents re-infection, allowing the dropper to avoid rewriting files.</p> <h3>DLL Sideloading</h3> <p>The final payload uses <strong>DLL sideloading</strong>, a technique where a legitimate executable loads a malicious DLL from the same directory instead of the system path. This allows JanelaRAT to run under the guise of a trusted application, evading signature-based detection.</p> <h2 id="detection">Detection and Protection</h2> <p>Kaspersky products detect JanelaRAT as <strong>Trojan.Script.Generic</strong> and <strong>Backdoor.MSIL.Agent.gen</strong>. Users in Latin America, especially those in financial sectors, should be cautious with unsolicited emails containing invoice-related links. Up-to-date security software and employee training on phishing are essential defenses.</p> <h2 id="conclusion">Conclusion</h2> <p>JanelaRAT represents a targeted threat to Latin American financial users. Its evolving infection chain, use of DLL sideloading, and region-specific targeting make it a persistent risk. By understanding its mechanisms, organizations can better defend against this and similar threats.</p> </article>
Tags: