JanelaRAT: A new threat to online banking security in Latin America

Apr 13, 2026 | Threat Intelligence Research

Evolving Threat Landscape: JanelaRAT Enhancements

TL;DR
JanelaRAT is a newly modified malware variant that targets financial data from users in Latin America. Its infection chain has evolved significantly since its inception, incorporating advanced features for evasion and adaptability.

Main Analysis
Kaspersky researchers have identified JanelaRAT as a multi-stage malware variant that has emerged since June 2023. This malware, derived from the BX RAT family, specifically aims at securing sensitive financial information from users in Brazil and Mexico. A novel title bar detection mechanism allows JanelaRAT to track and manipulate browser sessions effectively. The current evolution of JanelaRAT demonstrates the ongoing efforts of threat actors to enhance their infection strategies and to evade detection by incorporating dynamic and diverse delivery mechanisms.

The initial infection process typically initiates via social engineering tactics, with victims receiving emails that appear to contain pending invoices. Clicking on these emails redirects victims to a malicious site, ultimately leading to the download of a ZIP file. This file often contains VBScripts and other executables designed to sideload components of JanelaRAT. Recent campaigns have involved the integration of MSI files as drop agents, which serve the dual purpose of installing legitimate executables while masking malicious activity.

Rendered in detail through provided images, the evolution of JanelaRAT’s infection flow illustrates how threat actors are simplifying their processes to reduce the steps for malware installation. This streamlining indicates a deliberate strategy to increase the success rate of deployments while extending the operational lifespan of this malware.

Defensive Context
Organizations with users who interact with financial institutions in Latin America should prioritize awareness of JanelaRAT’s tactics. Those operating in this geographic region, particularly within the banking sector, could be directly affected by this evolving threat.

Why This Matters
The real-world risk associated with JanelaRAT lies in the malware’s sophisticated capabilities, particularly its focus on banking fraud and real-time manipulation of compromised systems. Attack surfaces are broad, as any user engaging with targeted financial sites could potentially fall victim to these campaigns.

Defender Considerations
Monitoring for the specified indicators of compromise will be critical. Noteworthy IOCs include the primary C2 domain ciderurginsx[.]com and the malware variants associated with JanelaRAT. Organizations should be alert to patterns of suspicious email behavior as well as unusual network traffic to known malicious domains. Engaging in activities to disrupt communications with the identified dynamic DNS service could also be a strategic response.

Indicators of Compromise

  • MSI Dropper: 808c87015194c51d74356854dfb10d9e
  • JanelaRAT: d7a68749635604d6d7297e4fa2530eb6
  • Primary C2 Domain: ciderurginsx[.]com

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles

Is your next data breach alert a cunning trap?

Is your next data breach alert a cunning trap?

Rise in Data Breach Notification Scams TL;DR: The proliferation of data breaches has led to a simultaneous increase in fake breach notification scams. Fraudsters utilize sophisticated methods,...