win.clipbanker (Back to overview)


The ClipBanker Trojan is known as an information stealer and spy trojan, it aims to steal and record any type of sensitive information from the infected environment such as browser history, cookies, Outlook data, Skype, Telegram, or cryptocurrency wallet account addresses. The main goal of this threat is to steal confidential information.
The ClipBanker uses PowerShell commands for executing malicious activities. The thing that made the ClipBanker unique is its ability to record various banking actions of the user and manipulate them for its own benefit. The distribution method of the ClipBanker is through phishing emails or through social media posts that lure users to download malicious content.

2020-07-29ESET Researchwelivesecurity
@techreport{welivesecurity:20200729:threat:496355c, author = {welivesecurity}, title = {{THREAT REPORT Q2 2020}}, date = {2020-07-29}, institution = {ESET Research}, url = {}, language = {English}, urldate = {2020-07-30} } THREAT REPORT Q2 2020
DEFENSOR ID HiddenAd Bundlore Pirrit Agent.BTZ Cerber ClipBanker CROSSWALK Cryptowall CTB Locker DanaBot Dharma Formbook Gandcrab Grandoreiro Houdini ISFB LockBit Locky Mailto Maze Microcin Nemty NjRAT Phobos PlugX Pony REvil Socelars STOP Tinba TrickBot WannaCryptor
2020CynetMax Malyutin
@online{malyutin:2020:threat:0895d39, author = {Max Malyutin}, title = {{Threat Research Report: Clipbanker – 13 Second Attack}}, date = {2020}, organization = {Cynet}, url = {}, language = {English}, urldate = {2020-09-02} } Threat Research Report: Clipbanker – 13 Second Attack
2019-04-30ESET ResearchESET Research
@online{research:20190430:buhtrap:ebdeba3, author = {ESET Research}, title = {{Buhtrap backdoor and Buran ransomware distributed via major advertising platform}}, date = {2019-04-30}, organization = {ESET Research}, url = {}, language = {English}, urldate = {2019-11-14} } Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Buhtrap ClipBanker RTM

There is no Yara-Signature yet.