Home / malware TrojanDownloader:Win32/Banload.ADN
First posted on 19 January 2012.
Source: MicrosoftAliases :
TrojanDownloader:Win32/Banload.ADN is also known as Trojan-Downloader.Win32.Banload.bozr (Kaspersky), Trojan.DL.Banload!VyXSOtj2/7A (VirusBuster), Trojan horse PSW.Banker6.IGP (AVG), TSPY_BANKER.SMY (Trend Micro).
Explanation :
TrojanDownloader:Win32/Banload.ADN is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers.
Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker.
Top
TrojanDownloader:Win32/Banload.ADN is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers.
Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker.
Installation
TrojanDownloader:Win32/Banload.ADN is usually distributed via compromised websites disguised as a webpage "\boleto.php". It may be distributed as a self-extracting archive together with component files that are designed to distract users when installing other malware onto the affected computer.
Below is a list of files contained in the self-extracting archive "camasultris.pps.exe":
- sultra.bat
- sultra.exe
- sultra.pps
- z-iconepps.ico
The file camasultris.pps.exe first executes sultra.bat; sultra.bat will then execute sultra.exe (which is the trojan downloader) and sultra.pps (which is a slide-show containing adult materials used to distract the user).
When TrojanDownloader:Win32/Banload.ADN is executed, it attempts to download arbitrary files to the infected computer, and saves them in the following directory:
%AppData%\bck.bck
Payload
Downloads and executes arbitrary files
TrojanDownloader:Win32/Banload.ADN connects to the following websites and attempts to download files, which may be detected as members of the TrojanSpy:Win32/Bancos family.
- suporteremoto.kinghost.net/<BLOCKED>/<random_name>/bck.bck
- silnikihonda.pl/<BLOCKED>/bck.bck
The downloaded files are saved to the %AppData% directory, then executed.
Analysis by Zarestel Ferrer
Last update 19 January 2012