Interestingly, this malware avoids taking data related to Russia's largest social networking application, VKontakte (vk.com), so its author is from Eastern Europe.
This bank Trojan is mainly spread via hacked website with SunDown Exploit Kit, but can also be accessed via email with a fake PDF button icon. When clicked, it will execute the JavaScript code to load and run the malware file. To avoid detection, it uses a drip, inject and load into parts.
Once infected, it enters the browser process to transfer the web connection to your proxy, read traffic and inject spyware. It also steals the authentication information by viewing the victim's request or injecting the JavaScript spyware code into the response.
Terdot can overcome the limits of TLS (Transport Layer Security) by creating a CA (Certificate Authority) and authenticating the domains that the victim accesses. Any information sent to a customer or social network is viewed and edited by Terdot in real time, meaning it can also be distributed via fake links on social networks.
More information about this trojan, you can read more here.https://labs.bitdefender.com/2017/11/terdot-zeus-based-malware-strikes-back-with-a-blast-from-the-past/