need advice on if the malware i found has helped a hacker break into a bank account

Posted on 2014-03-19
Last Modified: 2014-03-31
hi, I have a customer who has had money taken out of there bank account. I've done a malwarebytes scan and found the following on the attached txt file.
Can you advice me if any of these programs would have helped a hacker gain access to the bank account.

many thanks
Question by:total123
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
  • 2
  • +2
LVL 24

Expert Comment

ID: 39940964
Did he have his bank user id and password in an unencrypted file?

Did (s)he log on to his bank account using the infected computer?

Author Comment

ID: 39941003
the pc they use for the bank was the infected one.
the login details aren't stored on file.
LVL 24

Expert Comment

ID: 39941011
buguw.exe seems suspicious.

What security software is protecting the PC?
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

ID: 39941032
it was free avg 2012, but now avg IS
LVL 40

Assisted Solution

footech earned 66 total points
ID: 39941209
Just from the results I'm seeing the scan, I wouldn't think those had directly contributed.  A PUP (Potential Unwanted Program) is usually not malicious, just annoying (because of ads, search suggestions, etc.).  The trojan.downloader could have gotten something else (which is now gone or not detected by MalwareBytes) on the machine which could have helped to intercept traffic.  So, as I mentioned, just by what's been reported so far I wouldn't say conclusively that this machine is the number one suspect.

You might try running RogueKiller (or rkill) first, and then immediately running another scan with MalwareBytes to see if anything further is revealed.
LVL 38

Assisted Solution

BillDL earned 67 total points
ID: 39941290
I see that you haven't yet received any attention to your question over at bleepingcomputer.

Trojan.Downloader is unfortunately such a generic malware term that it would be impossible to know what malicious activity it performed, other than the usual business of helping to download additional unwanted software.

The log file implies that you haven't removed any of the malware.  If you still have the file:
then submit it to and see if any of the various online scanners identify it as malware with a more specific name.  Different AntiVirus companies use different names for specific viruses and their variants.  Knowing what that file may or may not be capable of would help you to know if it featured in the hacking activity.   The file name "buguw.exe" and the folder name "Falag" are most probably just random names.

If you haven't yet removed any of the entries flagged by the scan, then "buguw.exe" is still being run each time the system is booted, using the "Buguw" value in the registry key:

LVL 18

Accepted Solution

web_tracker earned 67 total points
ID: 39941332
If a person had their bank account hacked, it is extremely important that the person do the following: 1) contact their bank and inform them of what happened so the user can change their banking login information.
2) DO NOT connect the infected computer to the internet until the problem has been resolved. UNPLUG the network cable and if the system has a wireless network card disable it.
3) Even if scanners may not detect any more evidence of an infection, this system MUST be backed up and reinstall the operating system. Why take a chance that the system may still be infected and may compromise their banking in the future. The malware may be hidden where malware detection can not see it. Something may trigger it to be live again and thereby compromise the users sensitive data.
I sure would not take that chance.....

Author Comment

ID: 39949726
thanks for your advice every one, we have ended up formatting the machine.

Author Closing Comment

ID: 39966193
reformatted in the end. As noted, also posted on bleeping computer, with no replies until a good few days have passed.

thank you EE
LVL 38

Expert Comment

ID: 39966213
Thank you total123

Yes, over on bleepingcomputer there are about 6 "sticky" comments you need to plough through first to make sure that you run all the various freely available utility programs and only post the log files in specific forums.  An expert will arrive to examine the log files and suggest a bunch of other utilities to run, whilst examining the new logs in between, until either the programs have done their job or you are advised to format your hard drive.  By the time you have been through all of that, you will have been quicker (and safer) repartitioning and wiping the hard drive anyway.

Your question here was specifically about whether we thought that the reported malware might have helped somebody hack into a banking account, which (in case you were wondering) is why I simply offered my opinion and suggestions about that aspect only and didn't go into any depth about cleaning up the malware.

Author Comment

ID: 39966280
Hi, you were right in what I was asking for.

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Let's recap what we learned from yesterday's Skyport Systems webinar.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question