Home / malware TrojanDownloader:Win32/Banload.AAX
First posted on 23 August 2011.
Source: SecurityHomeAliases :
TrojanDownloader:Win32/Banload.AAX is also known as TROJ_OFICLA.AW (Trend Micro), Trojan-Downloader.Win32.Agent.fznn (Kaspersky), Troj/Dloadr-DEW (Sophos), Spyware.Keylogger (Symantec).
Explanation :
TrojanDownloader:Win32/Banload.AAX is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers. Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker.
Top
TrojanDownloader:Win32/Banload.AAX is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers. Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker. Installation TrojanDownloader:Win32/Banload.AAX creates the following files on an affected computer:
- %windir%\prefetch\<malware file>.exe-38016725.pf
- %windir%\prefetch\btstacfrr.exe-3a6d9632.pf
- %windir%\prefetch\btstaclrj.exe-38666504.pf
- %windir%\prefetch\btstacpgn.exe-1c5cc2fe.pf
- %windir%\prefetch\msgrupd.exe-0f78bd1f.pf
- <system folder>\btstacfrr.exe
- <system folder>\btstaclrj.exe
- <system folder>\btstacpgn.exe
- <system folder>\msgrupd.exe
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. Payload Contacts remote host TrojanDownloader:Win32/Banload.AAX may contact a remote host at www.sheileconstruarte.com using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 f41a18a8191b3bc802543ffdf47290a522496470.Last update 23 August 2011