Home / malware TrojanSpy:Win32/Banker.ABG
First posted on 08 November 2011.
Source: SecurityHomeAliases :
TrojanSpy:Win32/Banker.ABG is also known as Trojan.PWS.Banker!CBrrVopzxqM (VirusBuster), Trojan.PWS.Banker.60406 (Dr.Web), Win32/Spy.Delf.OWL trojan (ESET), Trojan-Banker.Win32.Banker.skjd (Kaspersky), Generic PWS.y!dmm (McAfee), TSPY_DELF.VTG (Trend Micro).
Explanation :
TrojanSpy:Win32/Banker.ABG is a trojan that downloads other files and has the ability to steal sensitive information, such as usernames and passwords, when the user accesses certain online banking websites.
Top
TrojanSpy:Win32/Banker.ABG is a trojan that downloads other files and has the ability to steal sensitive information, such as usernames and passwords, when the user accesses certain online banking websites.
Installation
When executed, TrojanSpy:Win32/Banker.ABG creates the following registry entry so that it executes every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Update"
With data: "<malware path and file name>"
TrojanSpy:Win32/Banker.ABG downloads a TXT file(usually "pid.txt"). This TXT file contains encrypted URLs where other files are to be downloaded.
In the wild, the TXT file has been known to be available for download from the following servers:
- 184.173.118.50
- 50.23.205.178
One of the files that this malware downloads is a DLL file, which is also detected as TrojanSpy:Win32/Banker.ABG.
This downloaded DLL component is usually dropped in the Windows System folder as any of the following file names, and then registered as a Browser Helper Object (BHO).
- rEvents.dll
- windowsinstaller.dll
Payload
Deletes files
TrojanSpy:Win32/Banker.ABG deletes the following files if they are found in the infected system. The file paths are hardcoded in the malware body.
- C:\Arquivos de Programas\mozilla firefox\firefox.exe
- C:\Arquivos de Programas\opera\opera.exe
- %USER%\Configurações locais\Dados de aplicativos\Google\Chrome\Application\Chrome.exe
Steals information
The DLL component monitors Internet Explorer to check if any of the following websites are accessed; these websites are associated with users in Brazil:
- BancoItaú-http://www.itau.com.br
- BancoVotorantim-http://www.bancovotorantim.com.br
- Banese-http://www.banese.com.br
- Banrisul-http://www.banrisul.com.br
- Bradesco-http://www.bradesco.com.br
- Caixa-http://www.caixa.gov.br
- Cetip-http://www.cetip.com.br
- HSBC-http://www.hsbc.com.br
- Orkut-http://www.orkut.com.br
- Santander-http://www.santander.com.br
- Sicredi-http://www.sicredi.com.br
This malware steals sensitive information, such as usernames and passwords, by creating a fake window on top of Internet Explorer when the login page of any of the previously mentioned websites is accessed.
The fake windows may appear similar to the following:
For Banese:
For Bradesco:
For Caixa:
For Cetip:
For HSBC:
For Itau:
For Satander:
The stolen information is then sent back to a remote server.
Sends spam messages
TrojanSpy:Win32/Banker.ABG also attempts to send spam messages to all of the user's Google Mail and Windows Live contacts.
Analysis by Ric Robielos
Last update 08 November 2011