Home / malwarePDF  

TrojanDownloader:Win32/Banload.ARY


First posted on 30 April 2013.
Source: Microsoft

Aliases :

TrojanDownloader:Win32/Banload.ARY is also known as Downloader/Win32.Banload (AhnLab), Trojan horse Downloader.Banload.CLEL (AVG), Win32/TrojanDownloader.Banload.RXB trojan (ESET), Trojan-Downloader.Win32.Banload (Ikarus), RDN/PWS-Banker!bj (McAfee), Mal/Banload-AB (Sophos).

Explanation :



Installation

This trojan might be dropped or downloaded into your computer by other malware. It usually has the file extension .CPL.



Payload

Downloads other malware

This trojan downloads a .ZIP file into your computer as "%APPDATA%\temp.zip". It might download this file from the website "informakl.p.ht" through port 80 or port 1433.

It then extracts the contents of this .ZIP file using a harcoded password. The file contained within the .ZIP file is usually detected as a member of the Win32/Bancos family and might have any of these file names:

  • libmysql.dll
  • lock.txt
  • resolver.exe
  • skypphone.exe
  • uber.txt


TrojanDownloader:Win32/Banload.ARY then makes the following change in your system registry, so that the extracted file automatically runs every time Windows starts:

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "inicializar"
With data: "%AppData%\<malware name>"

Steals sensitive information

This trojan might steal information about your computer, such as the computer name, user name, Windows version, and so on. It then sends this information to a remote server.



Analysis by Alden Pornasdoro

Last update 30 April 2013

 

TOP