Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

need advice on if the malware i found has helped a hacker break into a bank account

Posted on 2014-03-19
Last Modified: 2014-03-31
hi, I have a customer who has had money taken out of there bank account. I've done a malwarebytes scan and found the following on the attached txt file.
Can you advice me if any of these programs would have helped a hacker gain access to the bank account.

many thanks
Question by:total123
  • 5
  • 2
  • 2
  • +2
LVL 24

Expert Comment

ID: 39940964
Did he have his bank user id and password in an unencrypted file?

Did (s)he log on to his bank account using the infected computer?

Author Comment

ID: 39941003
the pc they use for the bank was the infected one.
the login details aren't stored on file.
LVL 24

Expert Comment

ID: 39941011
buguw.exe seems suspicious.

What security software is protecting the PC?
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.


Author Comment

ID: 39941032
it was free avg 2012, but now avg IS
LVL 40

Assisted Solution

footech earned 66 total points
ID: 39941209
Just from the results I'm seeing the scan, I wouldn't think those had directly contributed.  A PUP (Potential Unwanted Program) is usually not malicious, just annoying (because of ads, search suggestions, etc.).  The trojan.downloader could have gotten something else (which is now gone or not detected by MalwareBytes) on the machine which could have helped to intercept traffic.  So, as I mentioned, just by what's been reported so far I wouldn't say conclusively that this machine is the number one suspect.

You might try running RogueKiller (or rkill) first, and then immediately running another scan with MalwareBytes to see if anything further is revealed.
LVL 38

Assisted Solution

BillDL earned 67 total points
ID: 39941290
I see that you haven't yet received any attention to your question over at bleepingcomputer.

Trojan.Downloader is unfortunately such a generic malware term that it would be impossible to know what malicious activity it performed, other than the usual business of helping to download additional unwanted software.

The log file implies that you haven't removed any of the malware.  If you still have the file:
then submit it to https://www.virustotal.com and see if any of the various online scanners identify it as malware with a more specific name.  Different AntiVirus companies use different names for specific viruses and their variants.  Knowing what that file may or may not be capable of would help you to know if it featured in the hacking activity.   The file name "buguw.exe" and the folder name "Falag" are most probably just random names.

If you haven't yet removed any of the entries flagged by the scan, then "buguw.exe" is still being run each time the system is booted, using the "Buguw" value in the registry key:

LVL 18

Accepted Solution

web_tracker earned 67 total points
ID: 39941332
If a person had their bank account hacked, it is extremely important that the person do the following: 1) contact their bank and inform them of what happened so the user can change their banking login information.
2) DO NOT connect the infected computer to the internet until the problem has been resolved. UNPLUG the network cable and if the system has a wireless network card disable it.
3) Even if scanners may not detect any more evidence of an infection, this system MUST be backed up and reinstall the operating system. Why take a chance that the system may still be infected and may compromise their banking in the future. The malware may be hidden where malware detection can not see it. Something may trigger it to be live again and thereby compromise the users sensitive data.
I sure would not take that chance.....

Author Comment

ID: 39949726
thanks for your advice every one, we have ended up formatting the machine.

Author Closing Comment

ID: 39966193
reformatted in the end. As noted, also posted on bleeping computer, with no replies until a good few days have passed.

thank you EE
LVL 38

Expert Comment

ID: 39966213
Thank you total123

Yes, over on bleepingcomputer there are about 6 "sticky" comments you need to plough through first to make sure that you run all the various freely available utility programs and only post the log files in specific forums.  An expert will arrive to examine the log files and suggest a bunch of other utilities to run, whilst examining the new logs in between, until either the programs have done their job or you are advised to format your hard drive.  By the time you have been through all of that, you will have been quicker (and safer) repartitioning and wiping the hard drive anyway.

Your question here was specifically about whether we thought that the reported malware might have helped somebody hack into a banking account, which (in case you were wondering) is why I simply offered my opinion and suggestions about that aspect only and didn't go into any depth about cleaning up the malware.

Author Comment

ID: 39966280
Hi, you were right in what I was asking for.

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SHA2 certs for IIS AND Java? 2 113
Help with preventing downloading a zip file 10 45
Home wireless security 10 62
CDC and AOG on MS SQL 2012 13 23
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
OnPage: Incident management and secure messaging on your smartphone
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question