Home / malwarePDF  

TrojanDownloader:Win32/Banload.AAX


First posted on 23 August 2011.
Source: SecurityHome

Aliases :

TrojanDownloader:Win32/Banload.AAX is also known as TROJ_OFICLA.AW (Trend Micro), Trojan-Downloader.Win32.Agent.fznn (Kaspersky), Troj/Dloadr-DEW (Sophos), Spyware.Keylogger (Symantec).

Explanation :

TrojanDownloader:Win32/Banload.AAX is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers. Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker.
Top

TrojanDownloader:Win32/Banload.AAX is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers. Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker. Installation TrojanDownloader:Win32/Banload.AAX creates the following files on an affected computer:

  • %windir%\prefetch\<malware file>.exe-38016725.pf
  • %windir%\prefetch\btstacfrr.exe-3a6d9632.pf
  • %windir%\prefetch\btstaclrj.exe-38666504.pf
  • %windir%\prefetch\btstacpgn.exe-1c5cc2fe.pf
  • %windir%\prefetch\msgrupd.exe-0f78bd1f.pf
  • <system folder>\btstacfrr.exe
  • <system folder>\btstaclrj.exe
  • <system folder>\btstacpgn.exe
  • <system folder>\msgrupd.exe

Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. Payload Contacts remote host TrojanDownloader:Win32/Banload.AAX may contact a remote host at www.sheileconstruarte.com using port 80. Commonly, malware may contact a remote host for the following purposes:
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 f41a18a8191b3bc802543ffdf47290a522496470.

Last update 23 August 2011

 

TOP