ACH Transfer spams serve Banking Trojan (July 6, 2012)
The Dell Sonicwall UTM research team has been observing a recent increase in drive-by-download infections. These infections utilize the Blackhole Exploit and usually arrive in the form of spam masquerading as a legitimate company notification containing a malicious link.
The spam observed uses the following text and contains a malicious link:
The link takes the user to a malicious webpage that pretends to load a doc file containing further information:
The webpage contains javascript code the employs the Blackhole Exploit [Detected as Blacole.JI_2 (Exploit)]:
The exploit causes the download of a Cridex Banking Trojan variant:
The Trojan creates the following files on the filesystem:
- %APPDATA%KB00097753.exe [Detected as GAV: Banker.M_10 (Trojan)]
- %APPDATA%AB45AF71AB45AF71.DAT
- %APPDATA%AB45AF71AB45AF71.DAT.DAT
The Trojan creates the following registry key in the Windows registry to enable startup after reboot:
- HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun KB00097753.exe “%APPDATA%KB00097753.exe”
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
- GAV: Banker.M_10 (Trojan)
- GAV: Blacole.JI_2 (Exploit)