Home / malwarePDF  

Backdoor:Win32/IRCbot.gen!Z


First posted on 05 September 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/IRCbot.gen!Z is also known as Win32/Rbot (ESET), Backdoor.Rbot (Ikarus), Backdoor.Win32.Rbot.aea (Kaspersky), Generic.Sdbot.A2581542 (BitDefender), IRC/BackDoor.SdBot (AVG), W32.Spybot.Worm (Symantec), W32/Rbot-Gen (Sophos), W32/Sdbot.worm.gen.i (McAfee), Worm.RBot.Gen.10 (VirusBuster), Win32/IRCBot.worm.Gen (AhnLab), Worm/Rbot.316497 (Avira), WORM_SPYBOT.GEN (Trend Micro).

Explanation :



Backdoor:Win32/IRCbot.gen!Z is a backdoor trojan that connects to an Internet Relay Chat (IRC) server and provides attackers with unauthorized access and control of your computer. It is a member of the Backdoor:Win32/IRCbot family of backdoor trojans.



Installation

Backdoor:Win32/IRCbot.gen!Z copies itself to the %windir% or <system folder> directory with a random file name, and then runs that copy of itself. Some of the file names we have observed include:

  • CRACK + KEYGEN Medal of Honor Airborne- WORKING !!.zip
  • ddqps.exe
  • gsdazr.exe
  • hghaah.exe
  • iwjarv.exe
  • mvuvxx.exe
  • ogeslh.exe
  • Runescape_Pass_Crack_v4.1.exe
  • sbtegs.exe
  • sxrdqx.exe
  • touisf.exe
  • zngvbb.exe


Note: %windir% refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the Windows folder for Windows 2000 and NT is "C:\WinNT"; and for XP, Vista, and 7 it is "C:\Windows".

Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:\WinNT\System32"; and for XP, Vista, and 7 it is "C:\Windows\System32".

Backdoor:Win32/IRCbot.gen!Z modifies the following registry entry to ensure that its copy runs at each Windows start:

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>"
With data: "<malware name and location>", for example "C:\Windows\ddqps.exe"

The trojan uses a batch script with a random file name to delete itself.



Payload

Allows backdoor access and control

Backdoor:Win32/IRCbot.gen!Z attempts to connect to an IRC server, join a channel and wait for commands. Using this backdoor, an attacker can perform a number of actions on your computer, including the following:

  • Download and run arbitrary files
  • Terminate security process
  • Perform denial of service attacks on other computer or networks
  • Connect to other IRC servers
  • Upload files
  • Spread to other computers using various methods of propagation
  • Log keystrokes or steal sensitive data
  • Modify system settings
  • Run or terminate applications
  • Delete files


The IRC servers that we have observed Backdoor:Win32/IRCbot.gen!Z connecting to are listed in the Additional information section in this entry.

Modifies Hosts file

Backdoor:Win32/IRCbot.gen!Z adds the following lines to the Windows Hosts file to block access to the following security websites:

  • avp.com
  • ca.com
  • customer.symantec.com
  • dispatch.mcafee.com
  • download.mcafee.com
  • f-secure.com
  • kaspersky.com
  • kaspersky-labs.com
  • liveupdate.symantec.com
  • liveupdate.symantecliveupdate.com
  • mast.mcafee.com
  • mcafee.com
  • microsoft.com
  • my-etrust.com
  • nai.com
  • networkassociates.com
  • pandasoftware.com
  • rads.mcafee.com
  • secure.nai.com
  • securityresponse.symantec.com
  • sophos.com
  • symantec.com
  • trendmicro.com
  • update.symantec.com
  • updates.symantec.com
  • us.mcafee.com
  • viruslist.com
  • viruslist.com
  • virustotal.com
  • www.avp.com
  • www.ca.com
  • www.f-secure.com
  • www.grisoft.com
  • www.kaspersky.com
  • www.mcafee.com
  • www.microsoft.com
  • www.my-etrust.com
  • www.nai.com
  • www.networkassociates.com
  • www.pandasoftware.com
  • www.sophos.com
  • www.symantec.com
  • www.trendmicro.com
  • www.viruslist.com
  • www.virustotal.com


Drops and installs other malware

In the wild, we have observed Backdoor:Win32/IRCbot.gen!Z dropping and running the following malware:

  • Backdoor:Win32/Rbot.gen
  • BrowserModifier:Win32/Istbar.F
  • HackTool:Win32/Wpakill.B
  • Trojan:Win32/Gaobot.gen
  • Trojan:Win32/Qhost.I
  • VirTool:Win32/Cleanmbx.A
  • VirTool:WinNT/FURootkit.A


Backdoor:Win32/IRCbot.gen!Z may also drop malware that could disable Windows security services, including:

  • Trojan:BAT/Secoff.A
  • Trojan:WinREG/Secoff.B


Terminates security processes

The trojan terminates the following antivirus-related processes, if found on your computer:

  • _avpm.exe
  • antivirus.exe
  • aupdate.exe
  • avgw.exe
  • avp.exe
  • avp32.exe
  • avpcc.exe
  • blackice.exe
  • drweb32.exe
  • fsav.exe
  • navw32.exe
  • nod32.exe
  • persfw.exe
  • scan32.exe
  • zonealarm.exe
Additional information

To enable its backdoor access and control payload, Backdoor:Win32/IRCbot.gen!Z attempts to connect to any of the following IRC servers, using various ports:

  • albmsn.drshells.com
  • bb.qc.to
  • btanubis.sytes.net
  • chat.haraldmark.com
  • cmjc.no-ip.biz
  • dns.gatuzo.net
  • irc.legi0n.org
  • irc.niscaffe.rs
  • irc.nopics-mum.info
  • irc.rizon.net
  • irc.worldbraillearchive.net
  • l0lbutts3x.bookleech.com
  • m.DRD3H.COM
  • m4tr1x.m1cr0s0ft.net
  • stats.tuchat.net
  • tunit.p2p.com.hk
  • unkrandom.lanochets.com.ar
  • updates32.biz
  • windows.ns01.info


Backdoor:Win32/IRCbot.gen!Z creates the following mutexes, possibly as an infection marker to prevent multiple instances running on your computer:

  • BMW[NT] Bot
  • depth45-owns-you
  • Dev-Bot
  • exploit bots
  • GhostBOT
  • h43yh4cker
  • H-Bot Modded by SculenZ & TH Version 3.0
  • hooligan
  • Iroffer modified by Fr0zen
  • kiddbot
  • LIQUID
  • nzm bot modded by vlad
  • rootz
  • rx10B
  • RxBot
  • s bot 1.1
  • Silly Bot
  • sizzlss
  • SRX_BOT
  • SupaBot
  • Tr0gBot
Related encyclopedia entries

Backdoor:Win32/IRCbot

Backdoor:Win32/Rbot.gen

BrowserModifier:Win32/Istbar.F

HackTool:Win32/Wpakill.B

Trojan:BAT/Secoff.A

Trojan:Win32/Gaobot.gen

Trojan:Win32/Qhost.I

Trojan:WinREG/Secoff.B

VirTool:Win32/Cleanmbx.A

VirTool:WinNT/FURootkit.A



Analysis by Mihai Calota

Last update 05 September 2012

 

TOP