Home / malwarePDF  

PWS:Win32/Sinowal.gen!M


First posted on 28 May 2009.
Source: SecurityHome

Aliases :

PWS:Win32/Sinowal.gen!M is also known as Also Known As:Backdoor.Win32.Sinowal.dkc (Kaspersky), Mal/Sinowa-A (Sophos), PSW.Sinowal.S (AVG), Backdoor.Sinowal.BX (BitDefender), PWS-JA.gen.d (McAfee), :Trj/Sinowal.DW (Panda), Trojan.Mebroot (Symantec).

Explanation :

PWS:Win32/Sinowal.gen!M is the generic detection for a member of the Win32/Sinowal family. It drops other malware and steals online banking and FTP credentials.

Symptoms
There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptom(s).

PWS:Win32/Sinowal.gen!M is the generic detection for a member of the Win32/Sinowal family. It drops other malware and steals online banking and FTP credentials. Upon execution, PWS:Win32/Sinowal.gen!M drops two files in the Windows Temporary Folder. These files are also detected as PWS:Win32/Sinowal.gen!M. It also creates the mutex 'DD8D9E3C36AD47F8937D59F372EFF498' to ensure that only one copy of the trojan is running. It also drops the following malware:

  • PWS:Win32/Sinowal.gen!O - loaded as a service via svchost.exe with identifier {BEE686B9-4C84-4487-9D72-9F40F051E973}
  • VirTool:WinNT/Sinowal.F - rootkit driver that may contact remote systems to download other malware components
  • This trojan may monitor for banking information, such as login credentials to online banking accounts. It may also monitor for FTP user names and passwords. All gathered information is sent to a remote server.

    Analysis by Andrei Florin Saygo

    Last update 28 May 2009

     

    TOP