Home / malwarePDF  

Infostealer.Bankeiya


First posted on 28 February 2014.
Source: Symantec

Aliases :

There are no other names known for Infostealer.Bankeiya.

Explanation :

When the Trojan is executed, it creates the following registry entry so that it executes whenever Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"IcpIpCfg" = "Rundll32 "%UserProfile%\Application Data\[RANDOM FILE NAME].dll" MainThread"

Next, the Trojan downloads configuration settings from the following URL:
http://profile.hatena.ne.jp/ml[RANDOM NUMBER]

It then saves the configuration settings to the following file before updating itself:
%UserProfile%\Application Data\ini.ini

The Trojan sends the operating system (OS) version installed on the compromised computer to the following location:
http://www.bttxs.com/getp.asp?MAC=&VER=[OS VERSION]

The Trojan then monitors Internet Explorer traffic for the following URLs associated with online banking sites:
https://direct.jp-bank.japanpost.jp/tp1web/U010101SCK.do?link_id=ycDctLgn https://web4.ib.mizuhobank.co.jp/servlet/mib?xtr=EmfLogOff&NLS=JP
If one of the above URLs are visited, the Trojan will display a fake login screen and record any entered credentials.

The Trojan then sends the stolen credentials to the remote attacker.

Last update 28 February 2014

 

TOP