02/12/2013
15:15

Trojan.Win32.Banker.ZK: steal banking, FTP and email credentials


Continue the development of Zeus Trojan Banker that can steal our home banking login credentials!
 
Every day new variants of Trojan Banker are created from family of Zeus.

The CRAM (Anti-Malware Research Center of TG Soft) team has analyzed this new variant of Banker, called Trojan.Win32.Banker.ZK.

Name
: Trojan.Win32.Banker.ZK
Size: 217232 bytes
MD5: 5de629d93b248ec4175b39b5614178f9
Date: 11/28/2013

The Trojan.Win32.Banker.ZK  is downloaded and installed by Trojan.Win32.Dropper.R (MD5: 11c469a0c2e81e4fefbdf50f0835e249, size 73105 bytes).

The Trojan.Win32.Dropper.R arrive via email with attachment a false PDF document of invoice, order or payment.
The execution of the attached file (example orders.exe) involves the installation of the dropper inside the folder:
c:\documents and settings\all users\dxwmjh.exe

The threat (Trojan.Win32.Dropper.R ) adds itself to the registry to start when Windows starts:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run
[nnnnn] = %AllUsersProfile%\dx<random>.exe
 
where nnnnn = random number

Example:
[52098] = c:\documents and settings\all users\dxwmjh.exe

Inside the .EXE file of  Trojan.Win32.Dropper.R the  "Time Date Stamp" is: 11/27/2013 13:03:07

The Trojan.Win32.Dropper.R sends the following encrypted request at site http://dnc.su/bi??ing.php:

"T7xpI0TD7JHnucdjRCBiDoWU2CeeGjTYf035ZXT4VsTjcgJ9oBOndUnr04fvTICLBPQtY1Y/cxc2MA=="

The russian site, reply with a binary encrypted data packet.

The Trojan.Win32.Dropper.R sends the following request to install the Trojan.Win32.Banker.ZK and other malware:

http://rivernews.net/top??ws.php
http://latte.su/co??ee.php ---> jerry.bin (39675 bytes)
http://spa??hp.com/grow.exe
http://bizwires.net/fi??ing.php
http://ribous.com/y??k.php

At this point the threat Trojan.Win32.Banker.ZK is running and adds itself to the registry to start when Windows starts:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\run
[{random clsid}] = %userprofile%\%appdata%\<random1>\<random2>.exe

Example:
[{0964610F-8304-003F-5911-B02472E90F4E}] = C:\Documents and Settings\Luigi\Application Data\Nehire\ebkomo.exe

The Trojan.Win32.Banker.ZK is copied into a file with a random name in a folder with a random name, created inside "Application Data" of the user.

Inside the .EXE file of Trojan.Win32.Banker.ZK the "Time Date Stamp" is: 11/28/2013 09:36:42

The Trojan.Win32.Banker.ZK is able to steal the  login/password credentials of access to:
  • home banking
  • FTP
  • email
When the Trojan.Win32.Banker.ZK is running, this inject itself into all processes, hooking at the following API:

 Module: ntdll.dll
 LdrLoadDll  API hooking to inject himself in the new processes.
 NtCreateThread
 ZwCreateThread


 Module: KERNEL32.dll
 GetFileAttributesExW  API hooking to hide the attibutes of the object {3D077E0F-9C04-345C-5911-B02472E

 Module: USER32.dll
 BeginPaint  GetMessagePos API hooking to implement the function of keylogging and screen capture.
 CallWindowProcA  GetMessageW
 CallWindowProcW  GetUpdateRect
 DefDlgProcA  GetUpdateRgn
 DefDlgProcW  GetWindowDC
 DefFrameProcA  OpenInputDesktop
 DefFrameProcW  PeekMessageA
 DefMDIChildProcA  PeekMessageW
 DefMDIChildProcW  RegisterClassA
 DefWindowProcA  RegisterClassExA
 DefWindowProcW  RegisterClassExW
 EndPaint  RegisterClassW
 GetCapture  ReleaseCapture
 GetClipboardData  ReleaseDC
 GetCursorPos  SetCapture
 GetDC  SetCursorPos
 GetDCEx  SwitchDesktop
 GetMessageA  TranslateMessage

 Module: CRYPT32.dll
 PFXImportCertStore  API hooking to steal  the certificate.

 Module: WS2_32.dll and WININET.dll
WS2_32.dll  closesocket API hooking to monitor/capture the network traffic.
 send
 WSASend
WININET.dll  HttpQueryInfoA
 HttpSendRequestA
 HttpSendRequestExA
 HttpSendRequestExW
 HttpSendRequestW
 InternetCloseHandle
 InternetQueryDataAvailable
 InternetReadFile
 InternetReadFileExA

To steal email addesses from:
  • Windows Address Book

To steal email login/password from: 
  • Outlook Express
  • Windows Mail
  • Windows Live Mail
To steal client FTP login/password from:
  • FlashFXP
  • Total Commander
  • ws_ftp
  • FileZilla
  • Far ftp
  • WinSCP
  • FTP Commander
  • coreftp
  • smartftp

Botnet commands:
The Trojan.Win32.Banker.ZK communicate with the botnet with the following commands:
 os_shutdown  bot_httpinject_disable  user_execute  user_homepage_set
 os_reboot  bot_httpinject_enable  user_cookies_get  user_ftpclients_get
 bot_uninstall  fs_path_get  user_cookies_remove  user_emailclients_get
 bot_update  fs_search_add  user_certs_get  user_flashplayer_get
 bot_update_exe  fs_search_remove  user_certs_remove  user_flashplayer_remove
 bot_bc_add  user_destroy  user_url_block  
 bot_bc_remove  user_logoff  user_url_unblock  


Geolocation of domains contacted by Trojan.Win32.Banker.ZK and Trojan.Win32.Dropper.R:

Url:  latte.su  
IP address:  211.71.99.66
IP number:  3544671042
Country:  Cina
Region:  
City:  
Latitude:  35° 0' North
Longitude:  105° 0' East
Time Zone  China Standard Time
GMT Offset:  08:00:00

 Other urls:
 Url  IP address
 Country
 latte.su  211.71.99.66  China
 rivernews.net  200.63.220.114  Ecuador
 spa??hp.com  78.46.100.183  Germany
 dnc.su  106.120.241.226  China
 bizwires.net  208.73.210.177  United States
 ribous.com  208.73.210.177  United States


Clean
VirIT version 7.5.47 and later.


Analysis by eng. Gianfranco Tonello
C.R.A.M. (Anti-Malware Research Center)
by TG Soft
Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: