need advice on if the malware i found has helped a hacker break into a bank account

Posted on 2014-03-19
Last Modified: 2014-03-31
hi, I have a customer who has had money taken out of there bank account. I've done a malwarebytes scan and found the following on the attached txt file.
Can you advice me if any of these programs would have helped a hacker gain access to the bank account.

many thanks
Question by:total123
  • 5
  • 2
  • 2
  • +2
LVL 24

Expert Comment

ID: 39940964
Did he have his bank user id and password in an unencrypted file?

Did (s)he log on to his bank account using the infected computer?

Author Comment

ID: 39941003
the pc they use for the bank was the infected one.
the login details aren't stored on file.
LVL 24

Expert Comment

ID: 39941011
buguw.exe seems suspicious.

What security software is protecting the PC?

Author Comment

ID: 39941032
it was free avg 2012, but now avg IS
LVL 39

Assisted Solution

footech earned 66 total points
ID: 39941209
Just from the results I'm seeing the scan, I wouldn't think those had directly contributed.  A PUP (Potential Unwanted Program) is usually not malicious, just annoying (because of ads, search suggestions, etc.).  The trojan.downloader could have gotten something else (which is now gone or not detected by MalwareBytes) on the machine which could have helped to intercept traffic.  So, as I mentioned, just by what's been reported so far I wouldn't say conclusively that this machine is the number one suspect.

You might try running RogueKiller (or rkill) first, and then immediately running another scan with MalwareBytes to see if anything further is revealed.
New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

LVL 38

Assisted Solution

BillDL earned 67 total points
ID: 39941290
I see that you haven't yet received any attention to your question over at bleepingcomputer.

Trojan.Downloader is unfortunately such a generic malware term that it would be impossible to know what malicious activity it performed, other than the usual business of helping to download additional unwanted software.

The log file implies that you haven't removed any of the malware.  If you still have the file:
then submit it to and see if any of the various online scanners identify it as malware with a more specific name.  Different AntiVirus companies use different names for specific viruses and their variants.  Knowing what that file may or may not be capable of would help you to know if it featured in the hacking activity.   The file name "buguw.exe" and the folder name "Falag" are most probably just random names.

If you haven't yet removed any of the entries flagged by the scan, then "buguw.exe" is still being run each time the system is booted, using the "Buguw" value in the registry key:

LVL 18

Accepted Solution

web_tracker earned 67 total points
ID: 39941332
If a person had their bank account hacked, it is extremely important that the person do the following: 1) contact their bank and inform them of what happened so the user can change their banking login information.
2) DO NOT connect the infected computer to the internet until the problem has been resolved. UNPLUG the network cable and if the system has a wireless network card disable it.
3) Even if scanners may not detect any more evidence of an infection, this system MUST be backed up and reinstall the operating system. Why take a chance that the system may still be infected and may compromise their banking in the future. The malware may be hidden where malware detection can not see it. Something may trigger it to be live again and thereby compromise the users sensitive data.
I sure would not take that chance.....

Author Comment

ID: 39949726
thanks for your advice every one, we have ended up formatting the machine.

Author Closing Comment

ID: 39966193
reformatted in the end. As noted, also posted on bleeping computer, with no replies until a good few days have passed.

thank you EE
LVL 38

Expert Comment

ID: 39966213
Thank you total123

Yes, over on bleepingcomputer there are about 6 "sticky" comments you need to plough through first to make sure that you run all the various freely available utility programs and only post the log files in specific forums.  An expert will arrive to examine the log files and suggest a bunch of other utilities to run, whilst examining the new logs in between, until either the programs have done their job or you are advised to format your hard drive.  By the time you have been through all of that, you will have been quicker (and safer) repartitioning and wiping the hard drive anyway.

Your question here was specifically about whether we thought that the reported malware might have helped somebody hack into a banking account, which (in case you were wondering) is why I simply offered my opinion and suggestions about that aspect only and didn't go into any depth about cleaning up the malware.

Author Comment

ID: 39966280
Hi, you were right in what I was asking for.

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DDOS information about ip's, gateways and how it works 2 131
SQL BACKUP - 2008 R2 8 59
Protecting a SKY 4.0 (Android) devise 15 96
Botnet detection help me please 21 78
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Encryption for Business Encryption ( ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
A short film showing how OnPage and Connectwise integration works.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now