Home / malware Trojan-Downloader:W32/Banload.FVQ
First posted on 24 December 2008.
Source: SecurityHomeAliases :
There are no other names known for Trojan-Downloader:W32/Banload.FVQ.
Explanation :
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
right]This trojan is hosted on the website http://www.cad-portal.com/includes/[...].php and executes automatically when the user visits the website.
This trojan downloads a another trojan onto the system. The downloaded trojan steals the user's internet banking information and is detected as Trojan-Spy.Banbra.RM.
Execution
Upon execution, the trojan creates the file:
- %temp%loloolol86.txt
This text file contains the text 'olha'.
The trojan then downloads and execute the binary files:
- %windir%system32innit226.exe
- %windir%system32msnmsgsr.exe
To distract the user from detecting any malicious activity, the trojan also download innocuous-looking files from:
- http://www.paeksan.com/technote/001.jpg
- http://www.paeksan.com/technote/002.jpg
The first JPEG file, 001.jpg, will be renamed to msnmsgsr.exe; the second JPEG file, 002.jpg, will be renamed to innit226.exe. Both are renamed using Windows command prompt and stored on %windir%system32. As these files share similar names with the malicious binary files, they help camouflage the trojan's activity.
Upon successful execution of the trojan, Internet Explorer will open the page http://www.orkut.com, a social networking site.
This trojan was written in Borland Delphi.Last update 24 December 2008