Doctor Web examines password-stealing Trojan

Status
Not open for further replies.

omidomi

Level 71
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Apr 5, 2014
6,001
Doctor Web specialists have examined Trojan.DownLoader23.60762, which steals logins and passwords from popular browsers and downloads dangerous files.

Most modern Trojans execute either only one function or several simultaneously with one function dominating. Multi-purpose malicious programs are quite rare. Trojan.DownLoader23.60762 is one of them. It poses a threat to Windows devices. This malware downloads other applications onto the machines it infects, steals logins and passwords from browsers, and intercepts data entered on the pages of various websites.

Once launched on an attacked computer, Trojan.DownLoader23.60762 unpacks its own body and searches for fragments of malicious code in the memory of its process for further execution. Trojan.DownLoader23.60762 saves a copy of the executed file in a temporary folder on the disk of the infected device. It then records the path to this file in the system registry key responsible for automatically starting applications. As a result, the Trojan is launched along with the operating system.

A representative of banking Trojan family designed to steal private information and money from user bank accounts. In browsers, it intercepts the functions responsible for working with the network. This allows the malicious program to extract saved logins and passwords from browsers and send them to cybercriminals, and to intercept data entered by users on website pages.

The Trojan connects with a command and control server to receive such commands as:

  • Launch a file from the temporary folder on the disk of the infected computer;
  • Self inject in a running process;
  • Delete the specified file;
  • Launch the specified executable file;
  • Save the SQLite database used by Google Chrome and send it to the cybercriminals;
  • Change the command and control server to the one specified;
  • Delete cookies;
  • Restart the operating system;
  • Turn off the computer.
The signature for Trojan.DownLoader23.60762 is already in the Dr.Web database; therefore, this malicious program poses no threat to our users.
 

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Good share @omidomi :)
This is the main reason why I wouldn't want to test malware samples using Shadow Defender.
SD virtualizes the current Windows session and all the files and data it contains.
If you're testing malware like this, if not detected, it could steal login password and data according to the article.
The best thing would be always to use a VM, or at least you can encrypt, when possible, the sensitive data before any malware test using SD.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top