Names | Sinowal Anserin Mebroot Quarian Theola Torpig | |
Category | Malware | |
Type | Banking trojan, Backdoor, Info stealer, Credential stealer, Downloader, Exfiltration | |
Description | (Fortinet) The installer drops a dynamic-link library (DLL) onto the local hard disk. The DLL acts as a loader module and will load other components, if any exist, and download a manager module which plays a central role in conducting banking fraud. The manager module downloads several plug-in modules from the C&C server, aimed at different target applications. These modules are used to steal sensitive information including bank account details, email addresses and FTP accounts. All plug-in modules contact the manager module through a named pipe, while the manager module communicates directly with the C&C server, uploading stolen information, reporting the local status of the trojan and downloading configuration and plug-in modules, as well as script commands for the plug-in modules to run. | |
Information | <https://www.virusbulletin.com/virusbulletin/2014/06/sinowal-banking-trojan> <https://www.welivesecurity.com/2013/03/13/how-theola-malware-uses-a-chrome-plugin-for-banking-fraud/> <https://en.wikipedia.org/wiki/Torpig> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.sinowal> |
Last change to this tool card: 22 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon | 2010-Late 2022 | ||||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
2 groups listed (1 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |