
| Names | Sinowal Anserin Mebroot Quarian Theola Torpig | |
| Category | Malware | |
| Type | Banking trojan, Backdoor, Info stealer, Credential stealer, Downloader, Exfiltration | |
| Description | (Fortinet) The installer drops a dynamic-link library (DLL) onto the local hard disk. The DLL acts as a loader module and will load other components, if any exist, and download a manager module which plays a central role in conducting banking fraud. The manager module downloads several plug-in modules from the C&C server, aimed at different target applications. These modules are used to steal sensitive information including bank account details, email addresses and FTP accounts. All plug-in modules contact the manager module through a named pipe, while the manager module communicates directly with the C&C server, uploading stolen information, reporting the local status of the trojan and downloading configuration and plug-in modules, as well as script commands for the plug-in modules to run. | |
| Information | <https://www.virusbulletin.com/virusbulletin/2014/06/sinowal-banking-trojan> <https://www.welivesecurity.com/2013/03/13/how-theola-malware-uses-a-chrome-plugin-for-banking-fraud/> <https://en.wikipedia.org/wiki/Torpig> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.sinowal> | |
Last change to this tool card: 22 May 2020
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon | 2010-Oct 2024 | ||||
Unknown groups | |||||
| _[ Interesting malware not linked to an actor yet ]_ | |||||
2 groups listed (1 APT, 0 other, 1 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||