Welcome to the Virus Encyclopedia of Panda Security.
Its main objective is to steal passwords from the affected computer, which can be of any type. It reaches the computer downloaded by a variant belonging to the Trojan Nabload and passing itself off as a video. It does not spread automatically by its own means.
|First detected on:||March 4, 2008|
|Detection updated on:||March 5, 2008|
|Yes, using TruPrevent Technologies
Banker.KTG is a Trojan whose main objective is to steal passwords from the affected computer. These passwords can be of any type: login passwords to different websites, banking data, etc.
It reaches the computer downloaded by a variant belonging to the Trojan Nabload. The variants of this family are designed to download Trojans of the family Banker, whose aim is to steal passwords of any type. Consequently, confidential information about the user is endangered.
Banker.KTG does not spread automatically by its own means. It needs an attacking user's intervention in order to reach the affected computer.
Banker.KTG is easy to recognize, as it reaches the computer in a message inviting the user to see some photos:
If the user follows the link included in the message, an error message displayed indicating that an update of Flash Player needs to be installed:
Then, it connects to a false website to download the program update:
While this website is displayed, the Trojan Nabload.DCH is being downloaded to the computer. Then, this Trojan will download and install Banker.KTG. In order to go unnoticed, an animation video of YouTube is displayed while the Trojan is being downloaded.