ThaiCERT    ETDA    MDES
Report
Search
Home > List all groups > List all tools > List all groups using tool Sinowal

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Sinowal

NamesSinowal
Anserin
Mebroot
Quarian
Theola
Torpig
CategoryMalware
TypeBanking trojan, Backdoor, Info stealer, Credential stealer, Downloader, Exfiltration
Description(Fortinet) The installer drops a dynamic-link library (DLL) onto the local hard disk. The DLL acts as a loader module and will load other components, if any exist, and download a manager module which plays a central role in conducting banking fraud. The manager module downloads several plug-in modules from the C&C server, aimed at different target applications. These modules are used to steal sensitive information including bank account details, email addresses and FTP accounts. All plug-in modules contact the manager module through a named pipe, while the manager module communicates directly with the C&C server, uploading stolen information, reporting the local status of the trojan and downloading configuration and plug-in modules, as well as script commands for the plug-in modules to run.
Information<https://www.virusbulletin.com/virusbulletin/2014/06/sinowal-banking-trojan>
<https://www.welivesecurity.com/2013/03/13/how-theola-malware-uses-a-chrome-plugin-for-banking-fraud/>
<https://en.wikipedia.org/wiki/Torpig>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.sinowal>

Last change to this tool card: 22 May 2020

Download this tool card in JSON format

Previous: Sima
Next: sip_telephone

All groups using tool Sinowal

ChangedNameCountryObserved

Unknown groups

 _[ Interesting malware not linked to an actor yet ]_ 

1 group listed (0 APT, 0 other, 1 unknown)

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key