Trojan-Spy:W32/Banker.CPV
Summary
This is a trojan that steals bank-related credentials. It also has keylogging capabilities.
Removal
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
- Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
- Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
- Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Technical Details
This malware drops the following files:
- %windir%\system32\helper.sys - normal XML file that contains online transaction information
- %windir%\system32\coman.dll - Trojan-Spy.Win32.Banker.cpv
- %windir%\system32\cookie.dat - log file
- %windir%\system32\ps.dat - log file
- %windir%\system32\alog.txt - log file
- %windir%\system32\commands.xml - normal xml file from the its download link
It also installs its component as a Browser Helper Object so that every time that Internet Explorer is running, this malware also runs.
- HKLM\Software\Helper
- HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer \Browser Helper Objects\{327C3AF0-4EF6-4f8a-9A8D-685A4815D9F8}
- HKLM\Software\Classes\CLSID\{327C3AF0-4EF6-4f8a-9A8D-685A4815D9F8}
- HKLM\Software\Classes\CLSID\{327C3AF0-4EF6-4f8a-9A8D-685A4815D9F8}\InprocServer32
- HKLM\Software\Classes\CLSID\{327C3AF0-4EF6-4f8a-9A8D-685A4815D9F8}\ProgID
- HKLM\Software\Classes\CLSID\{327C3AF0-4EF6-4f8a-9A8D-685A4815D9F8}\TypeLib
This malware steals bank-related informations as well as passwords. It also has keylogging capability. It checks the sites that the infected user is visiting and compares it to the following bank-related strings:
- akbank.com.tr
- bankofamerica
- commbank.com.au/netbank/bankmain
- erheit.sparkasse-hannover.de
- ingportal.sparkasse-minden-luebbecke.de
- gad.de
- dserver.pipex.com/nationwide/
- netteller
- rbsdigital.com
- erage.bankingonline.de
- www.yapikredi.com.tr
It can also steal information such as:
- Outlook Express Password
- Deleted Outlook Express Account password
- Outlook password
- Deleted Outlook Account password
- MSN Explorer signup password
- IE auto-complete passwords
- IE auto-complete field
Here is a sample log file:
It sends a POST command to the following site to send all the stolen information from the infected machine:
- http://raspart2007.info/[removed].php
- http://raspart2007.info/[removed].php
More Support
Community
Ask questions in our Community.
User guides
Check the user guide for instructions.
Contact Support
Chat with with or call an agent.
Submit a Sample
Submit a file or URL for analysis.