{"id":2632,"date":"2024-09-25T19:07:53","date_gmt":"2024-09-25T19:07:53","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2632"},"modified":"2025-07-29T05:56:12","modified_gmt":"2025-07-29T05:56:12","slug":"spybanker-downloader-congratulations-you-just-pwned-yourself","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/spybanker-downloader-congratulations-you-just-pwned-yourself\/","title":{"rendered":"SpyBanker Downloader \u2013 congratulations, you just pwned yourself"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"211\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3757539358_6a1bd0050c_b.webp\" alt=\"SpyBanker Downloader \u2013 congratulations, you just pwned yourself\" class=\"wp-image-2640\" style=\"width:304px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Overview<\/strong><br><br>While most of the malware campaigns we\u2019ve covered rely on \u2018spray-and-pray\u2019 phishing campaigns to exploit known vulnerabilities, some attackers prefer the human touch \u2013 social engineering. At a high level, this involves manipulating a victim\u2019s behaivour so they take a certain course of action or divulge a particular piece of information.&nbsp;<br><br>One such campaign involves the SpyBanker downloader. This is a banking trojan which steals personal data like computer name, OS installed, antivirus, and banking details then aims to download further malware on the victim\u2019s device.&nbsp;<br><br><strong>Delivery<\/strong><br><br>In past SpyBanker campaigns, such as a particularly <a href=\"https:\/\/www.zscaler.com\/blogs\/research\/new-spy-banker-trojan-telax-abusing-google-cloud-servers\" target=\"_blank\" rel=\"noopener\">successful 2015 foray into Brazil<\/a>, the downloader spread through social media platforms, offering people coupons or other free products if they clicked on a bit[.]ly URL. It should come as no surprise that instead of free stuff, the other side of these URLs offered only the SpyBanker payload. This reliance on exploiting human behaivour means the attackers didn&#8217;t need to rely on specific system vulnerabilities \u2013 once SpyBanker Downloader is on a victim\u2019s computer, the hackers can just about do as they please.<br><br><strong>File Details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Name<\/td><td>doc_boleto_9876245138.exe<\/td><\/tr><tr><td>File Type&nbsp;&nbsp;<\/td><td>PE (Portable Executable) file<\/td><\/tr><tr><td>MD5 hash<\/td><td>ac33bb9b18a9980e8e7a5e275a98ba42<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis&nbsp;<\/strong><br><br>SpyBanker has the ability to get command line access using \u201cGetCommandLineW\u201d, check all file attributes&nbsp;<br><br>(permissions surrounding read, write, and execute) using \u201cGetFilesAttributesW\u201d, check file size using \u201cGetFileSize\u201d, and obtain startup information using \u201cGetStartupInfoW\u201d.<br><br>Static analysis also uncovered the malware&#8217;s ability to access the internet using \u201cInternetOpenUrlW\u201d, \u201cInternetOpenW\u201d, and \u201cInternetReadFile\u201d, its file dropping properties using \u201cWriteFile\u201d, and its ability to scan the target system for virtual machines using \u201cvirtualAlloc\u201d.&nbsp;<br><br>ts full attributes are shown below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"693\" height=\"651\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/edited.webp\" alt=\"\" class=\"wp-image-2641\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"695\" height=\"651\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-5-1.webp\" alt=\"\" class=\"wp-image-2635\"\/><\/figure>\n\n\n\n<p>&nbsp; &nbsp;&nbsp;<br><br><strong>Dynamic Analysis <\/strong>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;<br><\/p>\n\n\n\n<p>Upon execution, SpyBanker Downloader establishes a connection with the IP address \u201c138.197.179.85:80\u201d \u2013 as shown below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"661\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-5-1.webp\" alt=\"\" class=\"wp-image-2636\"\/><\/figure>\n\n\n\n<p>\u00a0This IP is known to host malware content:<br>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"557\" height=\"216\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-4-1.webp\" alt=\"\" class=\"wp-image-2638\"\/><\/figure>\n\n\n\n<p>When the above IP is contacted, another file (\u201c01.zip\u201d) is dropped onto the system. In this instance, the malware is a variant of the Zusy banking trojan. \u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-3-1-1024x555.webp\" alt=\"\" class=\"wp-image-2639\"\/><\/figure>\n\n\n\n<p>The zip file is installed in the following location: C:\\Documents and Settings\\Administrator\\Application Data\\rAmyK16tYN\\01.zip<br><br>This sample made the following registry entries:<br><br>HKU\\S-1-5-21-1614895754-1767777339-1801674531-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU\\f: &#8220;%appdata%\\1&#8221;<br><br>HKU\\S-1-5-21-1614895754-1767777339-1801674531-500\\Software\\Microsoft\\Windows\\ShellNoRoam\\MUICache\\C:\\Documents and Settings\\Administrator\\Desktop\\doc_boleto_9876245138.exe: &#8220;doc_boleto_9876245138&#8221;<br><br>HKU\\S-1-5-21-1614895754-1767777339-1801674531-500\\Software\\Microsoft\\Windows\\ShellNoRoam\\MUICache\\@shell32.dll,-21765: &#8220;Application Data&#8221;<br><br><strong>Indicators of Compromise (IOCs)<\/strong><br><br>In this SpyBanker sample, the IP address \u201c138.197.179.85:80\u201d was responsible for downloading the actual spyware, indicating the location of its Command and Control server.<br><br>Other indicators include:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Name<\/td><td>01.zip<\/td><\/tr><tr><td>MD5 hash<\/td><td>7f59a29694ab2e718fe2b65cf6ce9ada<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Conclusion<\/strong><br><br>Inboxes aren\u2019t the only avenue through which attackers will try to infect you. SpyBanker downloader most frequently <a href=\"https:\/\/www.komando.com\/happening-now\/340926\/watch-out-for-malware-hidden-in-facebook-posts\/all\" target=\"_blank\" rel=\"noopener\">spreads via social media<\/a> posts offering either free stuff or vouchers. Once the downloader is installed on the device, the attacker is free to do as they please. Because this relies on the victim installing it on their computer, even if you\u2019re completely patched you\u2019ve just handed over total access to your computer.&nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview While most of the malware campaigns we&rsquo;ve covered rely on &lsquo;spray-and-pray&rsquo; phishing campaigns to exploit known vulnerabilities, some attackers prefer the human touch &ndash; social engineering. At a high level, this involves manipulating a victim&rsquo;s behaivour so they take a certain course of action or divulge a particular piece of information.&nbsp; One such campaign [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2640,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2632"}],"version-history":[{"count":6,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2632\/revisions"}],"predecessor-version":[{"id":4299,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2632\/revisions\/4299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2640"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}