SYMBOLCOMMON_NAMEaka. SYNONYMS
jar.banload (Back to overview)

Banload


F-Secure observed Banload variants silently downloading malicious files from a remote server, then installing and executing the files.

References
2017-09-15Microsoft Security IntelligenceJireh Sanico
@online{sanico:20170915:trojandownloaderwin32banload:01d40c5, author = {Jireh Sanico}, title = {{TrojanDownloader:Win32/Banload}}, date = {2017-09-15}, organization = {Microsoft Security Intelligence}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=TrojanDownloader%3AWin32%2FBanload}, language = {English}, urldate = {2019-10-26} } TrojanDownloader:Win32/Banload
Banload
2017-04-27ColinGuruColin Hardy
@online{hardy:20170427:advanced:d1d61c4, author = {Colin Hardy}, title = {{Advanced Banload Analysis}}, date = {2017-04-27}, organization = {ColinGuru}, url = {https://colin.guru/index.php?title=Advanced_Banload_Analysis}, language = {English}, urldate = {2019-12-10} } Advanced Banload Analysis
Banload
2015-05ESET ResearchMatías Porolli, Pablo Ramos
@techreport{porolli:201505:cpl:f373211, author = {Matías Porolli and Pablo Ramos}, title = {{CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails}}, date = {2015-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2015/05/CPL-Malware-in-Brasil-zx02m.pdf}, language = {English}, urldate = {2019-12-17} } CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Banload
2014-01-27Trend MicroFernando Mercês
@techreport{mercs:20140127:cpl:3e3d5a8, author = {Fernando Mercês}, title = {{CPL Malware: Malicious Control Panel Items}}, date = {2014-01-27}, institution = {Trend Micro}, url = {https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf}, language = {English}, urldate = {2021-11-19} } CPL Malware: Malicious Control Panel Items
Banload Mevade

There is no Yara-Signature yet.