Home / malwarePDF  

Backdoor:Win32/IRCbot.FH


First posted on 24 February 2019.
Source: Microsoft

Aliases :

Backdoor:Win32/IRCbot.FH is also known as W32/Autorun.worm!my, Worm.Win32.Bybz.ddw.

Explanation :

Backdoor:Win32/IRCbot.FH is a member of Win32/IRCbot - a broad family of backdoor trojans that allows unauthorized access and control of an affected computer by a remote attacker via IRC. Installation When executed, Backdoor:Win32/IRCbot.FH copies itself to c:documents and settingsadministratorapplication datamicrosoftsvchost.exe.
The malware modifies the following registry entries to ensure that its copy executes at each Windows start:

Adds value: "Startup"
With data: "c:documents and settingsadministratorapplication datamicrosoftsvchost.exe"
To subkey: HKCUSoftwareMicrosoftwindowscurrentversion
un Spreads via… Removable drives Backdoor:Win32/IRCbot.FH may create the following files on targeted drives when spreading:

:svcpic.jpg
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system, so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
Note: This worm was observed to write an executable and create an autorun.inf file on a targeted drive in our automated testing environment. This is particularly common malware behavior, generally utilized in order to spread malware from computer to computer. It should also be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs. Payload Allows backdoor access and control Backdoor:Win32/IRCbot.FH allows unauthorized access and control of an affected computer. An attacker can perform any number of different actions on an affected computer using Backdoor:Win32/IRCbot.FH. This could include, but is not limited to, the following actions:
Download and execute arbitrary files Upload files Spread to other computers using various methods of propagation Log keystrokes or steal sensitive data Modify system settings Run or terminate applications Delete files
This malware description was produced and published using our automated analysis system's examination of file SHA1 10ae97b3fd01057cab0b036e9203adffdb35cfed.

Last update 24 February 2019

 

TOP