Ransomware & Malware

GoPix Banking Trojan: Memory-Only Threat

Brazil's cybercriminals just upped their game with GoPix, a banking Trojan that squats in your RAM like an uninvited guest. Forget disk traces—it's pure stealth, targeting Pix and crypto with MITM tricks.

GoPix banking Trojan infection chain via malvertising and memory implant

Key Takeaways

  • GoPix operates entirely in memory, leaving no disk artifacts for traditional detection.
  • Uses malvertising via Google Ads and legit anti-fraud services to target high-value Brazilian victims.
  • Sophisticated MITM for Pix/crypto theft; predicts spread beyond Brazil soon.

Everyone figured Brazilian banking malware topped out with Grandoreiro—those lumbering RATs that left footprints everywhere, easy pickings for decent forensics. Clunky. Predictable. Banks patted themselves on the back, rolling out half-baked anti-fraud tweaks.

Then GoPix shows up. Memory-only implants. Obfuscated PowerShell. This GoPix banking Trojan doesn’t just evolve; it mocks the old playbook, turning your PC into its personal ATM without touching the disk.

And here’s the kicker—it’s been lurking for over three years, feasting on Pix transactions, Boleto slips, even crypto wallets. Changes everything. Detection? Good luck.

Free Rent in Your RAM

GoPix doesn’t bother with files. Why would it? Disk scans are for amateurs. It loads modules straight into memory, swaps processes like a shell game—disabling your antivirus on the fly, maybe. Living-off-the-land binaries, LOLBins, make it blend right in.

The Brazilian crew behind it? They’re cribbing from APT playbooks—short-lived C2s that vanish after hours, abusing legit anti-fraud services to cherry-pick victims. State governments. Big corps. No sandboxes allowed.

“GoPix has reached a level of sophistication never before seen in malware originating in Brazil. It’s been over three years since we first identified it, and it remains highly active.”

That’s from the analysts tracking it. Spot on. But let’s call the bluff: this isn’t just ‘sophisticated.’ It’s a middle finger to every EDR tool out there.

Short-lived C2s mean YARA rules flop—nothing to hunt. Cleanup? Brutal. DFIR teams chase ghosts.

Malvertising: Google’s Dirty Little Secret?

Starts with Google Ads. Bait: WhatsApp Web fixes, Chrome updates, Correios tracking. Click-happy victims land on poisoned pages.

But smart. First, it pings a real anti-fraud service—browser fingerprints, env checks. Bot or sandbox? Bounce to dummy page. Real target? Unleash hell.

Check.php spits JSON with two URLs. Port 27275 open? That’s Avast Safe Banking—huge in Brazil. If yes, ZIP with LNK and PowerShell downloader. No? Fake NSIS exe.

We thought exploit at first. Nope. Just tailored delivery. Avast users get the scenic route.

Clever. Malvertising since ‘22, stolen code-signing certs. Evades everything traditional.

How Does GoPix Actually Steal Your Money?

MITM attacks, baby. Monitors Pix keys—Brazil’s instant payments, remember? Intercepts Boleto, crypto txns. Bypasses bank security like it’s tissue paper.

Persistence via memory. Switches procs for tasks—web injects, keylogs, whatever. Unseen MITM trick: proxies your traffic, swaps details mid-flight.

Unique insight time: this reeks of Lazarus Group echoes, but homegrown. North Korea hid malware in mem for years; now Brazilian thugs do it sans nation-state cash. Prediction? It’ll hop borders soon—Mexico, Argentina next. LATAM banks, brace.

Banks spin ‘we’re safe.’ Bull. Their anti-fraud? GoPix laughs, uses it against them.

Victim selection’s ruthless. No randos. High-value only. That’s why it’s raking it in.

Is Your Avast (or Anything Else) Useless Now?

Port check proves it: attackers map defenses. Avast popular? Pivot. Expect more.

Infection chain’s a beauty. Landing page → score → URLs → payload. PowerShell obfuscated to hell—downloads next stage, implants in mem.

No disk artifacts. Forensics nightmare. Analysts say it’s ‘unique.’ Understatement.

But here’s the acerbic truth: security vendors sleepwalked into this. Memory hunting? Rare. Most chase files. GoPix exploits that laziness.

Three years active. Still? Pathetic response.

Banks could patch—better bot checks, mem scans. Won’t. Too busy with PR.

Why Brazilian Banks Are a Sitting Duck

Pix exploded—fast cash, no fees. Crooks love it. GoPix tunes for it: txn manipulation, smoothly steals.

Crypto users? Bonus. Wallets drained mid-tx.

Historical parallel: like Zeus in 2010, but stealthier. Zeus wrote checks; GoPix ghosts.

Crew’s learning fast. From RAT/ATS to this? APT envy.

Short punch: Wake up.

Expect variants. Global reach.


🧬 Related Insights

Frequently Asked Questions

What is GoPix malware?

GoPix is a memory-resident banking Trojan targeting Brazilian Pix, Boleto, and crypto. Delivers via malvertising, evades AV with LOLBins and MITM attacks.

How does GoPix infect your computer?

Google Ads lure to fake pages. Anti-fraud checks filter bots. Tailored payloads—PowerShell or NSIS—implant in RAM, no disk traces.

How to protect against GoPix banking Trojan?

Disable Google Ads for banking searches. Run mem forensics tools like Volatility. Banks: mandate mem scans. Users: VPN, script blockers. But honestly? Good luck—it’s built to win.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is GoPix malware?
GoPix is a memory-resident banking Trojan targeting Brazilian Pix, Boleto, and crypto. Delivers via malvertising, evades AV with LOLBins and MITM attacks.
How does GoPix infect your computer?
Google Ads lure to fake pages. Anti-fraud checks filter bots. Tailored payloads—PowerShell or NSIS—implant in RAM, no disk traces.
How to protect against GoPix banking Trojan?
Disable Google Ads for banking searches. Run mem forensics tools like Volatility. Banks: mandate mem scans. Users: VPN, script blockers. But honestly? Good luck—it's built to win.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Securelist (Kaspersky)

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.