Home / malwarePDF  

TrojanDropper:Win32/Banker.J


First posted on 18 May 2012.
Source: Microsoft

Aliases :

TrojanDropper:Win32/Banker.J is also known as Trojan.Banker!Qc6E0s1OqHA (VirusBuster), Proxy.dropper (AVG), DR/Banker.AK (Avira), Generic.Banker.OT.5C6A27FD (BitDefender), Trojan.PWS.Banker1.1298 (Dr.Web), BAT/Spy.Banker.W trojan (ESET), Trojan-Banker.BAT.Banker.v (Kaspersky), PWS-Banker!hcq (McAfee), Infostealer.Bancos (Symantec), TROJ_BANKER.JDR (Trend Micro).

Explanation :



TrojanDropper:Win32/Banker.J is a trojan that drops a malicious JScript file, detected as TrojanProxy:JS/Banker.N, that may redirect your browser traffic through an attacker-controlled proxy server.



Installation

When executed, it drops and runs the following file, which is also detected as TrojanDropper:Win32/Banker.J:

%Temp%\7.tmp\devilNormal.bat



Payload

Downloads and runs files

When the file "devilnormal.bat" is run, it attempts to connect to the server "sivellongrupp.ee" via TCP port 80 to download a malicious JScript proxy configuration file detected as TrojanProxy:JS/Banker.N.

Modifies Internet settings

TrojanDropper:Win32/Banker.J modifies certain Internet settings by running commands against the system registry. It changes the following settings:

  • Sets the configuration file for Internet Explorer to "%Temp%/AVM5.txt", a text file that may be detected as TrojanProxy:JS/Banker.N
  • Enables HTTP 1.1
  • Disables the proxy server set in the registry
  • Disables the Use HTTP 1.1 through proxy connections setting in Internet Explorer
  • Prevents the Advanced tab from displaying in the Control Panel > Internet Options > Internet Properties dialog box
  • Resets Internet Explorer settings
  • Disables the Automatically Detect Settings check box




Analysis by Wei Li

Last update 18 May 2012

 

TOP