Home / malwarePDF  

TrojanDownloader:Win32/Banload.AUT


First posted on 17 December 2013.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:Win32/Banload.AUT.

Explanation :

Threat behavior TrojanDownloader:Win32/Banload.AUT is a member of Win32/Banload - a family of trojans that downloads other malware. Banload is usually used to download and install members of the Win32/Banker and Win32/Bancos families onto affected computers. Win32/Banker and Win32/Bancos are trojans that steal banking credentials and other sensitive data, and send it back to a remote attacker.

Installation

TrojanDownloader:Win32/Banload.AUT creates the following files on your computer:

  • \.pdf
  • \malwar~1.bat
  • c:\documents and settings\administrator\local settings\application data\{2gmf8wdv-20ko-jgoq-z2gp-euwmrsrg3q7c}\iq7533400c.exe
  • c:\documents and settings\administrator\local settings\application data\{2gmf8wdv-20ko-jgoq-z2gp-euwmrsrg3q7c}\swuz1yu.exe


Payload

Contacts remote hosts
TrojanDownloader:Win32/Banload.AUT may contact the following remote hosts using port 80:

  • centroamerica.hol.es
  • tvtem.hol.es

Commonly, malware may contact a remote host for the following purposes:
  • To confirm Internet connectivity
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 1380bced26c299e3147bb8c3eefaa2c06e30bcf0.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • The presence of the following files:

    .pdf
    \malwar~1.bat
    c:\documents and settings\administrator\local settings\application data\{2gmf8wdv-20ko-jgoq-z2gp-euwmrsrg3q7c}\iq7533400c.exe
    c:\documents and settings\administrator\local settings\application data\{2gmf8wdv-20ko-jgoq-z2gp-euwmrsrg3q7c}\swuz1yu.exe

Last update 17 December 2013

 

TOP