Home / malware TrojanSpy:Win32/Bancos.AKT
First posted on 19 February 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanSpy:Win32/Bancos.AKT.
Explanation :
Threat behavior
Installation
TrojanSpy:Win32/Bancos.AKT copies itself to c:\documents and settings\administrator\local settings\temp\willerr45835 pm.exe. The malware changes the following registry entries so that it runs each time you start your PC:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "hnmeadfbjnbfflkg"
With data: "c:\documents and settings\administrator\local settings\temp\willerr45835 pm.exe" The malware creates the following files on your PC:
- c:\documents and settings\administrator\local settings\temp\txt1.bac
Payload
Contacts remote host
TrojanSpy:Win32/Bancos.AKT might contact a remote host at smtps.uol.com.br using port 587. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 1eb68a739d4f3e9858cf471e96e05b3ffa2fd824.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\local settings\temp\txt1.bac
c:\documents and settings\administrator\local settings\temp\willerr45835 pm.exe
- You see these entries or keys in your registry:
Sets value: "hnmeadfbjnbfflkg"
With data: "c:\documents and settings\administrator\local settings\temp\willerr45835 pm.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunLast update 19 February 2014