Home / malware PWS:Win32/Banker.O
First posted on 29 February 2012.
Source: MicrosoftAliases :
PWS:Win32/Banker.O is also known as Trojan/Win32.Banker (AhnLab), W32/Savnut.A.gen!Eldorado (Command), W32/Banker.FODC (Norman), Trojan horse PSW.Banker6.DRS (AVG), Trojan.PWS.Banker.59271 (Dr.Web), Trojan-Banker.Win32.Agent (Ikarus), Trojan-Banker.Win32.Agent.ejd (Kaspersky), PWS-Banker!gyr (McAfee), Troj/Spy-XS (Sophos), Trojan.ADH (Symantec), TROJ_SAVNUT.SMC (Trend Micro).
Explanation :
PWS:Win32/Banker.O is a trojan that may steal banking credentials, such as account numbers and passwords, from the affected computer.
Top
PWS:Win32/Banker.O is a trojan that may steal banking credentials, such as account numbers and passwords, from the affected computer.
Installation
PWS:Win32/Banker.O drops a copy of itself as the following file:
<system folder>\appconf32.exe
Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the system folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
It modifies the following registry to ensure that its copy runs at every Windows start:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "Userinit"
With data: "<original data>,<system folder>\appconf32.exe"
where <original data> is the data before the malware changed it. For example, the default <original data> in Windows systems is "<system folder>\userinit.exe", which, on an affected computer, becomes:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "Userinit"
With data: "<system folder>\userinit.exe,<system folder>\appconf32.exe"
It may also create the following registry entries as part of its installation routine:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Internet
Sets value: "del"
With data: "<system folder>\appconf32.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\prh
Sets value: "prh"
With any of the following data:
"http://qgin<removed>ulmala.com "
"http://yyyf<removed>robots.com "
"http://qqse<removed>tehedel.com"
PWS:Win32/Banker.O also creates the following mutexes:
- MainProcess
- UpdateAppConf32
It may terminate itself if any of the following security-related processes are running:
- K7Sysmon.exe
- Mcvsshld.exe
Payload
Injects malicious code
PWS:Win32/Banker.O injects malicious code into all running processes, except for the following:
- csrss.exe
- iexplore.exe
- lsass.exe
- services.exe
- smss.exe
- srss.exe
- system
- winlogon.exe
Steals information
PWS:Win32/Banker.O steals the following information:
- Bank-related cookies
- Mozilla Firefox account informaiton
- Passwords for bank-related applications
It stores the stolen data in files in the following folders:
- <system folder>\cock\
- <system folder>\xmldm\
Terminates processes
PWS:Win32/Banker.O terminates the following processes, if they are currently running:
- chrome.exe
- firefox.exe
- java.exe
- msimn.exe
- opera.exe
- outlook.exe
- reader_sl.exe
- skype.exe
- winMail.exe
Analysis by Patrick Estavillo
Last update 29 February 2012