First posted on 01 March 2007.
Source: SecurityHome
Backdoor.Win32.Wisdoor.N is also known as  Backdoor:W32/Wisdoor.N, Wisdoor.N.
Wisdoor represents a family of backdoors. They allow the remote control of a victim's computer by sending specific commands via IRC channels. Also, these backdoors can steal data and spread to computers vulnerable to exploits.
cription
 The Windoor.N file is a PE executable about 20 kilobytes long, packed with ASPACK file compressor.
When the Windoor.N file is started, it copies itself as a file named "windll.exe" to the Windows folder and then creates the following startup key value in the Registry:
 
 -  [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
"windll" = "%WINDIR%windll.exe"
  
 
When the Backdoor is active, it connects to an IRC server, joins a certain channel and acts as a bot there.
The following IRC server and port is used by the Backdoor:
 
 
The backdoor joins the following IRC channel:
 
 
A hacker can send commands to the bots to and control infected computers. Several tasks can be performed, including the following:
 
 - Start HTTP server
  -  Perform ping, SYN, ICMP and UDP flood
  -  Get system information including information about OS, network and drives
  -  Download and execute files
  -  Log keystrokes
  -  Capture video using webcam
  -  Send and receive files
  -  Scan and exploit computers vulnerable to exploits
  
 
When spreading, the bot can exploit the following vulnerabilities:
 
 
 - IIS port 80 using 'Web Server Folder Traversal' Vulnerability (MS00-078)
  -  MSSQL port 1443, trying to get access using blank SA account password
  
Last update 01 March 2007
 
TOP