Home / malwarePDF  

Backdoor:Win32/IRCbot.gen!S


First posted on 15 December 2009.
Source: SecurityHome

Aliases :

There are no other names known for Backdoor:Win32/IRCbot.gen!S.

Explanation :

Backdoor:Win32/IRCbot.gen!S is a generic detection for a number of variants of the Backdoor:Win32/IRCbot family. Backdoor:Win32/IRCbot is a family of backdoor trojans that allows unauthorized access and control of affected computers.
Top

Backdoor:Win32/IRCbot.gen!S is a generic detection for a number of variants of the Backdoor:Win32/IRCbot family. Backdoor:Win32/IRCbot is a family of backdoor trojans that allows unauthorized access and control of affected computers. After a computer is infected, the trojan connects to an IRC server and joins a specified channel in order to receive commands. Commands may vary, but can include instructing the trojan to spread to other computers via network shares with weak passwords, or by exploiting Windows vulnerabilities on targeted machines. Some variants of Backdoor:Win32/IRCbot.gen!S also have the ability to spread via logical and removable drives.

Installation
Backdoor:Win32/Rbot.gen!S variants install by copying themselves to the <system folder> with a filename that differs according to minor variant. They then run the dropped executable. In the wild, we have observed variants copying themselves to the following locations, for example:

  • <system folder>\wmispacs.exe
  • <system folder>\ vmwareservice.exe
  • <system folder>\ wmibus.exe
  • Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP and Vista is C:\Windows\System32. Backdoor:Win32/Rbot.gen!S variants modify a number of registry entries in order to run their copy at each system start, and to facilitate their operations on the affected machine. The following modifications were observed being made by one variant, for example: Sets value: "GON"
    With data: "<path to malware executable>"
    To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions Sets value: "ctfmon.exe"
    With data: "ctfmon.exe"
    To subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Sets value: "ctfmon.exe"
    With data: "ctfmon.exe"
    To subkey: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal
    Sets value: "ctfmon.exe"
    With data: "ctfmon.exe"
    To subkey: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network Sets value: "Debugger"
    With data: "<dropped malware file name>.exe"
    To subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe Sets value: "C:\WINDOWS\system32\<dropped malware file name>.exe"
    With data: "disablenxshowui"
    To subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers Some variants of Backdoor:Win32/IRCbot.gen!S create remote threads in the process memory of explorer.exe in order to perform further functions.Spreads via€¦ Removable drives Some variants of Backdoor:Win32/IRCbot.gen!S copy themselves using variable file names to logical or removable drives. They also drop an autorun.inf file to the root directory of the drive, so the dropped copy can be automatically executed when the drive is accessed or media is inserted. For example, one variant d rops the following files when spreading in this manner:
  • <Drive>:\recycler\s-1-6-21-2434476501-1644491937-600003330-1213 \desktop.ini
  • <Drive>:\recycler\s-1-6-21-2434476501-1644491937-600003330-1213\autorunme.exe - this file is detected as Backdoor:Win32/IRCbot.gen!S
  • <Drive>:\autorun.inf - this file is detected as Worm:Win32/Autorun.gen!inf
  • Exploit Some variants have the ability to spread by exploiting various Windows vulnerabilities. They scan random IPs on TCP port 445 for vulnerable machines to exploit. Instant messagingVariants of Backdoor:Win32/IRCbot.gen!S can be ordered by a remote attacker (using the backdoor functionality mentioned under Payload, below) to spread via instant messaging applications. In these cases, the malware looks for window classes related to IM and if found, hijacks the windows in order to insert a link to itself and send it to the user's contacts.

    Payload
    Disables or lowers security settings Backdoor:Win32/IRCbot.gen!S may attempt to disable security program services and processes. One variant was observed stopping services and processes associated with Nod32, AVG, Sunbelt and AVAST. Allows backdoor access and control Backdoor:Win32/IRCbot.gen!S allows unauthorized access and control of an affected machine. We have observed this trojan listening on a random port (e.g. TCP port 20563), and contacting an IRC server in order to receive instruction from a remote attacker. Backdoor commands can include (but are not limited to) actions such as:
  • Scanning for unpatched computers on the network
  • S preading through Instant Messaging
  • Scanning ports on the network
  • Downloading and executing remote files
  • Monitoring network traffic
  • L aunching HTTP/HTTPD, SOCKS4, and TFTP/FTP servers
  • Retrieving computer configuration information, including Windows logon information, user account information, open shares, file system information, network connection information, and IE start page configuration
  • Retrieving CD keys of games
  • Uploading/downloading files through FTP
  • Manipulating processes and services
  • Conducting denial of service (DoS) attacks
  • Disabling a list of security processes. For example:
    A2HIJACKFREESETUP.EXE
    APM.EXE
    APORTS.EXE
    APT.EXE
    ASVIEWER.EXE
    ATF-CLEANER.EXE
    AUTORUNS.EXE
    AVENGER.EXE
    AVGARKT.EXE
    AVINSTALL.EXE
    AVZ.EXE
    BC5CA6A.EXE
    BOOTSAFE.EXE
    BUSCAREG.EXE
    CATCHME.EXE
    CF9409.EXE
    COMBO-FIX.EXE
    COMBOFIX.BAT
    COMBOFIX.COM
    COMBOFIX.EXE
    COMBOFIX.SCR
    COMMAND.COM
    COMPAQ_PROPIETARIO.EXE
    CPORTS.EXE
    CPROCESS.EXE
    CUREIT.EXE
    DARKSPY105.EXE
    DELAYDELFILE.EXE
    DLLCOMPARE.EXE
    DUBATOOL_AV_KILLER.EXE
    ELISTA.EXE
    EULALYZERSETUP.EXE
    FILEALYZ.EXE
    FILEFIND.EXE
    FIXBAGLE.EXE
    FIXPATH.EXE
    FOLDERCURE.EXE
    FPORT.EXE
    FSB.EXE
    FSBL.EXE
    GMER.EXE
    GUARD.EXE
    GUARDXKICKOFF.EXE
    GUARDXSERVICE.EXE
    HACKMON.EXE
    HELIOS.EXE
    HIJACK-THIS.EXE
    HIJACKTHIS.EXE
    HIJACKTHIS_SFX.EXE
    HIJACKTHIS_V2.EXE
    HJ.EXE
    HJTINSTALL.EXE
    HJTSETUP.EXE
    HOOKANLZ.EXE
    HOSTSFILEREADER.EXE
    ICESWORD.EXE
    IEFIX.EXE
    INSTALLWATCHPRO25.EXE
    ISSDM_EN_32.EXE
    JAJA.EXE
    K7TS_SETUP.EXE
    KAKASETUPV6.EXE
    KILLAUTOPLUS.EXE
    KILLBOX.EXE
    LISTO.EXE
    LORDPE.EXE
    MBAM-SETUP.EXE
    MBAM.EXE
    MRT.EXE
    MRTSTUB.EXE
    MSASCUI.EXE
    MSMPENG.EXE
    MSNCLEANER.EXE
    MSNFIX.EXE
    MYPHOTOKILLER.EXE
    NETALYZ.EXE
    NETSTAT.EXE
    NTVDM.EXE
    OBJMONSETUP.EXE
    OLLYDBG.EXE
    OTMOVEIT.EXEMBAM-SETUP.EXE
    P08PROMO.EXE
    PAVARK.EXE
    PENCLEAN.EXE
    PG2.EXE
    PGSETUP.EXE
    PORTDETECTIVE.EXE
    PORTMONITOR.EXE
    PROCDUMP.EXE
    PROCESSMONITOR.EXE
    PROCEXP.EXE
    PROCMON.EXE
    PROJECTWHOISINSTALLER.EXE
    PSKILL.EXE
    REANIMATOR.EXE
    REG.EXE
    REGALYZ.EXE
    REGCOOL.EXE
    REGEDIT.COM
    REGEDIT.SCR
    REGISTRAR_LITE.EXE
    REGMON.EXE
    REGSCANNER.EXE
    REGSHOT.EXE
    REGUNLOCKER.EXE
    REGUNLOCKER.EXETSNTEVAL.EXEXP_TASKMGRENAB.EXE
    REGX2.EXE
    RKD.EXE
    ROOTALYZER.EXE
    ROOTKITBUSTER.EXE
    ROOTKITNO.EXE
    ROOTKITREVEALER.EXE
    ROOTKIT_DETECTIVE.EXE
    SAFEBOOTKEYREPAIR.EXEOTMOVEIT3.EXEHOSTSXPERT.EXEDAFT.EXE
    SDFIX.EXE
    SEEM.EXE
    SPF.EXE
    SPYBOTSD.EXE
    SPYBOTSD160.EXE
    SRENGLDR.EXE
    SRENGPS.EXE
    SRESTORE.EXE
    STARTDRECK.EXE
    SUPERANTISPYWARE.EXE
    SUPERKILLER.EXE
    SYSANALYZER_SETUP.EXE
    TASKKILL.EXE
    TASKLIST.EXE
    TASKMAN.EXE
    TASKMON.EXE
    TCPVIEW.EXE
    TEATIMER.EXE
    TrendMicro_TISPro_16.1_1063_x32.EXE
    UNHACKME.EXE
    UNIEXTRACT.EXE
    UNLOCKER.EXE
    UNLOCKER1.8.7.EXE
    UNLOCKERASSISTANT.EXE
    VBA32-PERSONAL-LATEST-ENGLISH.EXE
    VIPRE.EXE
    VIRUS.EXE
    VIRUSUTILITIES.EXE
    WINDOWS-KB890930-V2.2.EXE
    WIRESHARK.EXE
    WITSETUP.EXE


  • Analysis by Lena Lin

    Last update 15 December 2009

     

    TOP