New Brazilian banking trojan "agenteV2" uses fake court summons to deliver interactive backdoor with real-time screen streaming, enabling operator-assisted financial fraud targeting major Brazilian

banks and crypto wallets.
Brazilian phishing delivers agenteV2: a Nuitka-compiled banking stealer targeting major banks with live screen streaming via WebSocket.
any.run
Technical breakdown:
• Interactive WebSocket backdoor (uws://) streams victim screens via PIL+mss to operator who manually controls banking sessions in real time
• Triple persistence: Registry Run key + two Scheduled Tasks (/rl highest) + UAC bypass via /elevated /fromtask
• Targets 7 major Brazilian

banks (ItaĂş, Banco do Brasil, Bradesco, Santander) + 5 crypto wallet extensions
• Core DLL compiled with Nuitka (Python→native code) - no extractable bytecode, ~27MB with debug strings intact
• Pastebin dead-drop resolver (pastebin[.]com/raw/0RmxqY57) enables C2 rotation without redeployment
• Bypasses browser SQLite locks via shutil.copyfile to %TEMP% before credential extraction
• Probes for Brazilian

anti-fraud solutions (Diebold Warsaw, GbPlugin) indicating deliberate regional targeting