x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Ash.B

Threat LevelModerate threatDamageHighDistributionNot widespread
Common name:Ash.B
Technical name:Trj/Ash.B
Threat level:Low
Alias:Trojan-Spy.Win32.Banker.mg, PWSteal.Bankash.E
Type:Trojan
Effects:  

It logs keystrokes entered when accessing certain web pages. It ends processes belonging to several antispyware and security programs, deletes their executable files from the hard drive and gathers e-mail addresses.

Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:March 21, 2005
Detection updated on:April 5, 2005
StatisticsNo

Brief Description 

    

Ash.B is a keylogger type Trojan that logs keystrokes entered when the user accesses certain web pages belonging to companies in different production branches, such as banking, telecommunications, news, computers, etc. It also logs accesses to certain websites, belonging to several banking companies and web pages secured with the HTTPS protocol.

Ash.B ends processes belonging to antispyware and security programs, and also deletes several executable files related to those from the hard drive, which prevents them from working properly.

This Trojan also gathers e-mail addresses, which it searches for in files with certain extensions.

Ash.B does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, e-mail messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.

Visible Symptoms 

    

Ash.B is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.