Home / malwarePDF  

Trojan:Win32/Derbit.B


First posted on 26 January 2017.
Source: Microsoft

Aliases :

There are no other names known for Trojan:Win32/Derbit.B.

Explanation :

Installation

This trojan is downloaded by the Donoff trojan downloader family, such as TrojanDownloader:O97M/Donoff or TrojanDownloader:O97M/Donoff. It arrives as an encrypted file with file extension .kov.

Usually it will be saved to the following path:

  • %APPDATA% \Roaming\Iron\feup.kov


There's a separate PHP script (Trojan:PHP/Derbit.A) that decrypts, runs, and deletes the presence of this trojan.

The trojan will be run with the name explorer.exe, so it will appear in the process explorer as explorer.exe.

Payload

Collects your log in and PC information

This trojan collects your personal information, and information about your PC. We have seen it attempt to collect the following:
  • The username and password you use to log in to your PC
  • The geographical location of your PC, based on your computer's IP address
  • PC information, including whether it is 32- or 64-bit, your username, and the computer name
  • The usernames and passwords you use for online banking by monitoring your web browser and looking for credit card information


It sends the collected information to a remote connection. We have seen it attempt to send to the following:
  • hxxp://hadhesusela.com/bdk/gate.php


Additional information

This analysis used file sample with SHA1 25a16b9306e4216730f417f99dba98fbb9660fa4.



Analysis by Ferdinand Plazo

Last update 26 January 2017

 

TOP