Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Metamorfo

104
Global rank
132 infographic chevron month
Month rank
137 infographic chevron week
Week rank
0
IOCs

Metamorfo is a trojan malware family that has been active since 2018. It remains a top threat, focusing on stealing victims’ financial information, including banking credentials and other data. The malware is known for targeting users in Brazil.

Trojan
Type
Unknown
Origin
1 April, 2018
First seen
12 December, 2025
Last seen
Also known as
Casbaneiro

How to analyze Metamorfo with ANY.RUN

Type
Unknown
Origin
1 April, 2018
First seen
12 December, 2025
Last seen

IOCs

IP addresses
149.28.108.157
38.54.20.37
193.203.190.217
86.38.217.167
209.74.71.168
216.238.82.27
158.69.110.217
185.45.195.226
212.46.38.43
154.56.63.216
154.223.16.114
185.185.87.45
139.177.193.74
62.72.22.30
45.32.90.70
20.92.164.32
172.105.111.154
137.220.53.87
192.46.216.151
38.54.20.180
Hashes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agosto2019.servepics.com
seradessavez.ddns.net
noturnis.zapto.org
4d9p5678.myvnc.com
hostsize.sytes.net
facturas.co.in
midiavideostv.click
url27.shop
archivosdwn.cloud
archivesautomacion.ddns.net
adbd.tech
cfdimex.cloud
facturacioncontable.com
satventasfac.tech
facturasm.cloud
starlinkspacex.com.br
cargafactura.life
ventasmex123.com.mx
salvec.tech
facturasmex.cloud
URLs
http://15.228.77.178/ytr/serv.php
http://185.34.52.145/zips/peru.zip
http://185.34.52.145/peru/ybnzkvj.php
http://15.228.14.203/PKJHGFRTJMNBVFDCV/serv.php
http://f0727071.xsph.ru/contador/serv.php
http://f0696125.xsph.ru/close/serv.php
http://f0717271.xsph.ru/serv.php
http://20.226.52.51/$/serv.php
http://20.226.52.51//mMES79281%23//DAIUYTREWDVBJIUYTXCS.png
http://20.226.52.51//mMES79281%23//JHGFDWQWERTYJNBVDSDE.gif
http://20.197.177.145//Loads//MNBVCXZSERTYHGFDWQ.png
http://20.197.177.145//Loads//ENVIOGSAYDSAGDDSADIS.gif
http://20.197.177.145/Envio/serv.php
http://20.197.177.145//Loads//MEUGSAYDSAGDDSADIS.gif
http://20.197.177.145/MEU/serv.php
http://sbaratao.com.br/controler/conta/inspecionando.php
http://20.206.241.68/v/serv.php
http://172.200.176.88/kitlouco.php
http://20.55.14.49/sucesso2023/kitlouco.php
http://154.223.16.114/25/index.php
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 3415
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 657
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 599
comments 0

What is Metamorfo malware?

Metamorfo, also known as Casbaneiro, is a trojan malware family used for exfiltrating financial information. The operators behind the malicious software spread it primarily via phishing campaigns. While initially, users living in Brazil were the core victims of the malware, the attackers later expanded the list of targeted countries.

Keylogging serves as the main method of collecting information from the infected devices. To facilitate the process, Metamorfo can display fake bank forms requesting users’ credentials. At the same time, the malware can also be employed to steal other sensitive data, as well as take screenshots.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the Metamorfo malicious software

One of the ways Metamorfo manages to collect users’ login banking info is by first killing all the browser processes and then modifying the registry to disable auto-complete and auto-suggest. This is done to force the user to enter their login and other form details manually, allowing Metamorfo’s keylogging capability to record the keys they press.

Metamorfo also can scan the clipboard and replace any saved crypto wallet address with that of the attacker. As a result, victims may unknowingly send their funds to criminals.

On top of that, the malware can search for certain files on the infected device using specific keywords and exfiltrate them to the attacker. Metamorfo can also download additional files from its C2, meaning that it can update itself and install other malicious software.

Many attacks involving the malware have been observed to implement DLL hijacking. This technique enables Metamorfo to run its code with the help of legitimate processes, which allows it to stay undetected by traditional security solutions.

The malware can also display fake security pop-ups of popular Brazilian banks, informing the users that their account has been compromised. The next window then requests the victim to share their login credentials.

Metamorfo gains persistence on the system by creating a task that launches the malware at every new startup.

Execution process of Metamorfo

Let’s upload a sample of Metamorfo to the ANY.RUN sandbox to explore its execution chain.

This particular Trojan family often employs a deceptive strategy of embedding itself into installers that unsuspecting users download in the hopes of installing legitimate software. Our analyzed sample, also in MSI format, deviates from this common modus operandi by employing more sophisticated installation techniques. Instead of relying on fake installer windows to blend in, it utilizes a combination of a hidden window and the header "Installation Database" to conceal its installation process.

Upon execution, the downloaded sample establishes a connection to a remote server to retrieve the primary payload, Metamorfo. Once Metamorfo is downloaded, it is launched, initiating a series of malicious activities. These activities include creating a file in the startup directory to ensure its persistent operation and, to evade detection, subsequently removing this file from the startup registry.

Once established, the dropped file, SlimBoat, takes center stage, orchestrating a coordinated attack on the compromised system. It loads additional modules, establishes a connection to the remote server, and embarks on the primary objective of exfiltrating sensitive information.

Metamorfo process tree shown in ANY.RUN Metamorfo's process tree demonstrated in ANY.RUN

Distribution methods of the Metamorfo malware

Similar to other trojan malware families like Agent Tesla and Remcos, Metamorfo is distributed using phishing emails with malicious attachments in the form of archives with an .MSI file inside and PDFs. In some attacks, criminals also send links. The subject of the email usually concerns finance, asking the recipient to conduct an invoice payment.

Conclusion

Despite being active since 2018, Metamorfo continues to pose a major threat to users in Brazil and other countries, including the United States. Organizations without reliable security measures in place are particularly vulnerable to such attacks. As Metamorfo typically spreads through emails, checking all the incoming files and links should be top priority for organizations that do not wish to fall victim to the malware.

ANY.RUN is a cloud-based malware analysis sandbox that lets you quickly analyze any suspicious file and URL to determine whether it is malicious. The service also generates reports on the threats identified, containing all the necessary intelligence, including indicators of compromise (IOCs).

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Spyware screenshot
Spyware
spyware
Spyware is a stealth form of malware whose primary objective is to gather sensitive information, such as personal data, login credentials, and financial details, by monitoring user activities and exploiting system vulnerabilities. Spyware operates secretly in the background, evading detection while transmitting collected data to cybercriminals, who can then use it for malicious purposes like identity theft, financial fraud, or espionage.
Read More
XRed screenshot
XRed
xred
XRed operates as a stealthy backdoor, enabling cybercriminals to gain unauthorized remote access to infected systems. XRed has gained particular notoriety for its distribution through trojanized legitimate software and hardware drivers, making it exceptionally dangerous due to its ability to masquerade as trusted applications.
Read More
Jigsaw screenshot
Jigsaw
jigsaw
The Jigsaw ransomware, initially detected in 2016, encrypts files on compromised systems and requires a ransom payment in Bitcoin. If the ransom is not paid, the malware starts deleting files, increasing the pressure on victims to comply. Its source code is publicly accessible, allowing various threat actors to customize and repurpose the malware for different objectives.
Read More
Chaos Ransomware screenshot
Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques.
Read More
Rootkit screenshot
Rootkit
rootkit bootkit
A rootkit is a type of malicious software designed to provide unauthorized administrative-level access to a computer or network while concealing its presence. Rootkits are tools used by cybercriminals to hide their activities, including keyloggers, spyware, and other malware, often enabling long-term system exploitation.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More