Trojan.Win32.InfoStealer.bNUS also known as Trojan.Dropper.HE, TSPY_BANKER.YOUR, Win32:MalOb-LM [Cryp].
Malware Analysis of Trojan.Win32.InfoStealer.bNUS – ZNRFH.EXE
Created files:
%Temp%\MSWQC.tmp
%Temp%\qbvqb.exe
%Temp%\znrfh.exe
%Startup%\2adf457.exe
C:\2adf457\2adf457.exe
Autostart registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\2adf45: “C:\2adf457\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\2adf457: “%Appdata%\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\*adf45: “C:\2adf457\2adf457.exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\*adf457: “%Appdata%\2adf457.exe”
Detected by UnHackMe:
ZNRFH.EXE
Default location: %TEMP%\ZNRFH.EXE
Dropper hash(md5): 1ccdb7655e04260db934628fba37b255