PWS-Jginko

This page shows details and results of our analysis on the malware PWS-Jginko

Overview

This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.


Minimum DAT

4531 (2005-07-08)

Updated DAT

4625 (2005-11-10)

Minimum Engine

5400.1158

File Length

65,536

Description Added

2005-07-08

Description Modified

2005-07-12

Malware Proliferation

Characteristics

This is a password stealing trojan that captures Japanese online bank account information and sends this information to the author via http. The characteristics of this trojan with regards to the file names, the hostnames, etc will differ, depending on the way in which the attacker had configured it. Hence, this is a general description.

Upon execution, it copies itself to "C:\system.exe".

Then it adds the following registry entry.

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "system.exe" = C:\system.exe

The trojan monitors the internet access to the following sites to steal user account information.

  • direct.btm.co.jp
  • direct.hokugin.co.jp
  • direct.resonabank.co.jp
  • direct.smbc.co.jp
  • direct02.btm.co.jp
  • direct3.smbc.co.jp
  • directa03.shinseibank.co.jp
  • fes.ebank.co.jp
  • houjin.shinkinbanking.com
  • ib.iy-bank.co.jp
  • net.gunmabank.co.jp
  • okbnetplaza.com
  • sso.ufjbank.co.jp
  • web.ib.mizuhobank.co.jp
  • web1.ib.mizuhobank.co.jp
  • web2.ib.mizuhobank.co.jp
  • web3.ib.mizuhobank.co.jp
  • web4.ib.mizuhobank.co.jp
  • web5.ib.mizuhobank.co.jp
  • www.105bank.com
  • www.caweb.anser.or.jp
  • www.japannetbank.co.jp
  • www.resonabank.anser.or.jp
  • www.shinkinbanking.com
  • www.shinkin-webfb.jp
  • www.shinkin-webfb-hokkaido.jp
  • www.suitebank.finemax.net
  • www.ufjbank.co.jp
  • www.web-fb.com
  • www10a.cyber-biz.ne.jp
  • www10b.cyber-biz.ne.jp
  • www10c.cyber-biz.ne.jp
  • www10d.cyber-biz.ne.jp
  • www11a.cyber-biz.ne.jp
  • www11b.cyber-biz.ne.jp
  • www12a.cyber-biz.ne.jp
  • www12b.cyber-biz.ne.jp
  • www12c.cyber-biz.ne.jp
  • www12d.cyber-biz.ne.jp
  • www13a.cyber-biz.ne.jp
  • www13c.cyber-biz.ne.jp
  • www13d.cyber-biz.ne.jp
  • www14a.cyber-biz.ne.jp
  • www2.ib-center.gr.jp
  • www2.paweb.anser.or.jp
  • www4.cyber-biz.ne.jp
  • www4a.cyber-biz.ne.jp
  • www7.cyber-biz.ne.jp
  • www8b.cyber-biz.ne.jp
  • www9a.cyber-biz.ne.jp
  • www9b.cyber-biz.ne.jp
  • www9c.cyber-biz.ne.jp
  • www9d.cyber-biz.ne.jp
  • www-ihs.yu-cho.japanpost.jp
  • https://direct02.btm.co.jp/cgi-bin/gx.cgi/AppLogic+JP.co.btm.ib.bank.lgin.AL_lginIndicateFrameSet
  • https://fes.ebank.co.jp/FES/ebank/EbankServlet?COMMAND=LOGIN&&CurrentPageID=START
  • https://www.japannetbank.co.jp/login.html
  • https://www.resonabank.anser.or.jp/cgi/Sta.cgi?CCT0080=0010
Then it sends the information to the author via http.

Symptoms

  • Existence of files and keys mentioned above.

Method of Infection

N/A. Password Stealers are not viruses, and as such do not themselves contain any method to replicate. However they may themselves be downloaded by other viruses and/or Trojans to be installed on the user's system.

Many of these additionally are mass spammed by the author to entice people into double-clicking on them.

Alternatively they may be installed by visiting a malicious web page (either by clicking on a link, or by the website hosting a scripted exploit which installs the Password Stealer onto the user's system with no user interaction.

Removal

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

But in some particular cases, the following steps need to be taken.

Please go to the Microsoft Recovery Console and restore a clean MBR.

On Windows XP:

  • Insert the Windows XP CD into the CD-ROM drive and restart the computer.
  • When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
  • Select the Windows installation that is compromised and provide the administrator password.
  • Issue 'fixmbr' command to restore the Master Boot Record
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.


On Windows Vista and 7:

  • Insert the Windows CD into the CD-ROM drive and restart the computer.
  • Click on "Repair Your Computer".
  • When the System Recovery Options dialog comes up, choose the Command Prompt.
  • Issue 'bootrec /fixmbr' command to restore the Master Boot Record.
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.

Variants