Trojan[Downloader]/Win32.Banload also known as W32/Dadobra.A.gen!Eldorado, TROJ_SPNR.09GH14, Win32:Dropper-gen [Drp].
Malware Analysis of Trojan[Downloader]/Win32.Banload – PMROJECT1.EXE
Created files:
%Local Appdata%\Google\Chrome\User Data\Default\Web Data-journal
%Local Appdata%\Google\Chrome\User Data\lockfile
%Program Files%\FlashSockv01\Pmroject1.exe
Autostart registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdatedv01: “%Program Files%\FlashSockv01\Pmroject1.exe”
Detected by UnHackMe:
PMROJECT1.EXE
Default location: %PROGRAM FILES%\FLASHSOCKV01\PMROJECT1.EXE
Dropper hash(md5): a60009592c4e6f2f5e7ca6dbb12a2c22