Threat Database Trojans Trojan-Banker.Win32.Banbra.ukb

Trojan-Banker.Win32.Banbra.ukb

By JubileeX in Trojans

Trojan-Banker.Win32.Banbra.ukb is a Trojan designed to steal a victim's online banking details. Trojan-Banker.Win32.Banbra.ukb targets Windows operating systems and uses keylogger functionality to harvest victims' passwords and credit card numbers. Trojan-Banker.Win32.Banbra.ukb transmits the stolen data to a remote server or a predefined e-mail address.

File System Details

Trojan-Banker.Win32.Banbra.ukb may create the following file(s):
# File Name Detections
1. %AppData%\BID\Log
2. %Temp%\BID\cookies
3. %ProgramFiles%\Bulk Image Downloader\help
4. %ProgramFiles%\Bulk Image Downloader\locale\ar
5. %ProgramFiles%\Bulk Image Downloader\locale\bs\LC_MESSAGES
6. %ProgramFiles%\Bulk Image Downloader\locale\cs
7. %ProgramFiles%\Bulk Image Downloader\locale\da\LC_MESSAGES
8. %ProgramFiles%\Bulk Image Downloader\locale\el
9. %ProgramFiles%\Bulk Image Downloader\locale\en\LC_MESSAGES
10. %ProgramFiles%\Bulk Image Downloader\locale\es_GL
11. %ProgramFiles%\Bulk Image Downloader\locale\et\LC_MESSAGES
12. %ProgramFiles%\Bulk Image Downloader\locale\fr
13. %ProgramFiles%\Bulk Image Downloader\locale\hr\LC_MESSAGES
14. %ProgramFiles%\Bulk Image Downloader\locale\it
15. %ProgramFiles%\Bulk Image Downloader\locale\lt\LC_MESSAGES
16. %ProgramFiles%\Bulk Image Downloader\locale\nl
17. %ProgramFiles%\Bulk Image Downloader\locale\pl\LC_MESSAGES
18. %ProgramFiles%\Bulk Image Downloader\locale\pt_BR
19. %ProgramFiles%\Bulk Image Downloader\locale\ro\LC_MESSAGES
20. %ProgramFiles%\Bulk Image Downloader\locale\sk
21. %ProgramFiles%\Bulk Image Downloader\locale\sr\lc_messages
22. %ProgramFiles%\Bulk Image Downloader\locale\tr
23. %ProgramFiles%\Bulk Image Downloader\locale\uk\LC_MESSAGES
24. %ProgramFiles%\Bulk Image Downloader\locale\zh_CHT
25. %AppData%\BID
26. %Temp%\BID
27. %ProgramFiles%\Bulk Image Downloader\firefox extension
28. %ProgramFiles%\Bulk Image Downloader\locale
29. %ProgramFiles%\Bulk Image Downloader\locale\bs
30. %ProgramFiles%\Bulk Image Downloader\locale\ca\LC_MESSAGES
31. %ProgramFiles%\Bulk Image Downloader\locale\da
32. %ProgramFiles%\Bulk Image Downloader\locale\de\LC_MESSAGES
33. %ProgramFiles%\Bulk Image Downloader\locale\en
34. %ProgramFiles%\Bulk Image Downloader\locale\es\LC_MESSAGES
35. %ProgramFiles%\Bulk Image Downloader\locale\et
36. %ProgramFiles%\Bulk Image Downloader\locale\fi\LC_MESSAGES
37. %ProgramFiles%\Bulk Image Downloader\locale\hr
38. %ProgramFiles%\Bulk Image Downloader\locale\id\LC_MESSAGES
39. %ProgramFiles%\Bulk Image Downloader\locale\lt
40. %ProgramFiles%\Bulk Image Downloader\locale\lv\LC_MESSAGES
41. %ProgramFiles%\Bulk Image Downloader\locale\pl
42. %ProgramFiles%\Bulk Image Downloader\locale\pt\LC_MESSAGES
43. %ProgramFiles%\Bulk Image Downloader\locale\ro
44. %ProgramFiles%\Bulk Image Downloader\locale\ru\LC_MESSAGES
45. %ProgramFiles%\Bulk Image Downloader\locale\sr
46. %ProgramFiles%\Bulk Image Downloader\locale\sv\LC_MESSAGES
47. %ProgramFiles%\Bulk Image Downloader\locale\uk
48. %ProgramFiles%\Bulk Image Downloader\locale\zh_CHS\LC_MESSAGES
49. %CommonPrograms%\Bulk Image Downloader
50. %AppData%\BID\Queue
51. %ProgramFiles%\Bulk Image Downloader
52. %ProgramFiles%\Bulk Image Downloader\iemenu
53. %ProgramFiles%\Bulk Image Downloader\locale\ar\LC_MESSAGES
54. %ProgramFiles%\Bulk Image Downloader\locale\ca
55. %ProgramFiles%\Bulk Image Downloader\locale\cs\LC_MESSAGES
56. %ProgramFiles%\Bulk Image Downloader\locale\de
57. %ProgramFiles%\Bulk Image Downloader\locale\el\LC_MESSAGES
58. %ProgramFiles%\Bulk Image Downloader\locale\es
59. %ProgramFiles%\Bulk Image Downloader\locale\es_GL\LC_MESSAGES
60. %ProgramFiles%\Bulk Image Downloader\locale\fi
61. %ProgramFiles%\Bulk Image Downloader\locale\fr\LC_MESSAGES
62. %ProgramFiles%\Bulk Image Downloader\locale\id
63. %ProgramFiles%\Bulk Image Downloader\locale\it\LC_MESSAGES
64. %ProgramFiles%\Bulk Image Downloader\locale\lv
65. %ProgramFiles%\Bulk Image Downloader\locale\nl\LC_MESSAGES
66. %ProgramFiles%\Bulk Image Downloader\locale\pt
67. %ProgramFiles%\Bulk Image Downloader\locale\pt_BR\LC_MESSAGES
68. %ProgramFiles%\Bulk Image Downloader\locale\ru
69. %ProgramFiles%\Bulk Image Downloader\locale\sk\LC_MESSAGES
70. %ProgramFiles%\Bulk Image Downloader\locale\sv
71. %ProgramFiles%\Bulk Image Downloader\locale\tr\LC_MESSAGES
72. %ProgramFiles%\Bulk Image Downloader\locale\zh_CHS
73. %ProgramFiles%\Bulk Image Downloader\locale\zh_CHT\LC_MESSAGES

Registry Details

Trojan-Banker.Win32.Banbra.ukb may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FC17A95-AFC6-4AB2-8196-BF55262079D0}\ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B317B6C1-F55B-48AF-8621-81A3A1FFC95E}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B317B6C1-F55B-48AF-8621-81A3A1FFC95E}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}\1.0\0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}\1.0\HELPDIR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\bidiecom.BIDInterface
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\DefaultIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\shell\open\command
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bulk Image Downloader_is1
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\En&queue current page with BID
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BI&D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
HKEY_CURRENT_USER\Software\Javasoft
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FC17A95-AFC6-4AB2-8196-BF55262079D0}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FC17A95-AFC6-4AB2-8196-BF55262079D0}\Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B317B6C1-F55B-48AF-8621-81A3A1FFC95E}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}\1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}\1.0\FLAGS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.bidqueue
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\shell\open
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\DefaultIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\open\command
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open &link target with BID
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent
HKEY_CURRENT_USER\Software\Antibody Software\Bulk Image Downloader
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FC17A95-AFC6-4AB2-8196-BF55262079D0}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FC17A95-AFC6-4AB2-8196-BF55262079D0}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B317B6C1-F55B-48AF-8621-81A3A1FFC95E}\ProxyStubClsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4E50084A-CD0A-4CE8-9E79-25F050DFADAB}\1.0\0\win32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.bidlist
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\bidiecom.BIDInterface\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloader\shell
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\BulkImageDownloaderQueue\shell\open
HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\Old_Current
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Enqueue link tar&get with BID
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Open current page with BID Link E&xplorer
HKEY_CURRENT_USER\Software\Antibody Software
HKEY_CURRENT_USER\Software\Javasoft\Ex

Trending

Most Viewed

Loading...