Home / malware TrojanDownloader:Win32/Banload.AYP
First posted on 13 October 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Banload.AYP.
Explanation :
Threat behavior
Installation
TrojanDownloader:Win32/Banload.AYP creates the following files on your PC:
- c:\documents and settings\administrator\747011.jmp
- c:\documents and settings\administrator\start.jmp
- c:\documents and settings\administrator\local settings\application data\microsoft\internet explorer\recovery\active\
.dat - c:\documents and settings\administrator\local settings\application data\microsoft\internet explorer\recovery\active\recoverystore.
.dat - c:\documents and settings\administrator\local settings\temp\~dfb22e.tmp
- c:\documents and settings\administrator\local settings\temp\~dfebc6.tmp
- c:\documents and settings\administrator\local settings\temp\image.gif
- c:\documents and settings\administrator\microsoft\windowsupdate\em4.jmp
Payload
Contacts remote host
TrojanDownloader:Win32/Banload.AYP might contact a remote host at loirinvidanova01.hospedagemdesites.ws using port 80. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 e5cfe109f481c6c5e6a4cfada056e31618393b5c.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\747011.jmp
c:\documents and settings\administrator\start.jmp
c:\documents and settings\administrator\local settings\application data\microsoft\internet explorer\recovery\active\.dat
c:\documents and settings\administrator\local settings\application data\microsoft\internet explorer\recovery\active\recoverystore..dat
c:\documents and settings\administrator\local settings\temp\~dfb22e.tmp
c:\documents and settings\administrator\local settings\temp\~dfebc6.tmp
c:\documents and settings\administrator\local settings\temp\image.gif
c:\documents and settings\administrator\microsoft\windowsupdate\em4.jmpLast update 13 October 2014