Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Backdoor:W32/IRCBot.DIG


Aliases:


Backdoor.Win32.IRCBot.dig

Malware
Backdoor
W32

Summary

A remote administration tool (RAT) which bypasses normal security mechanisms to secretly control a program, computer or network.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

This malware may arrive as a file downloaded from a malicious website, or as a message received over an instant messaging application such as MSN messenger, AIM, or AIM Triton.


Execution

Upon execution, the malware will drop a copy of itself into the Windows folder as:

  • %windir%\servicean.exe

It creates an entry in the registry, which allows the malware to start automatically:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Windows svchost = servicean.exe

It then checks the following processes:

  • svchost.exe
  • explorer.exe
  • hidserv.exe
  • winlogon.exe
  • services.exe
  • crss.exe

The malware will search the process memory for the following strings:

  • RFB 003.008
  • RXBot
  • [MAIN]
  • [SCAN]
  • [FTP]
  • NZM
  • scan.stop
  • NZM/ST
  • scanall
  • YaBot

It will terminate the processes in the process memory if found.


Backdoor

It then immediately attempts to connect to a specific channel on a specific IRC server, which the unauthorized remote user is using to access and control any infected machines.

Once connected to the IRC server, the infected machine is ready to accept and execute commands from the remote user. The remote user can perform a variety of actions such as:

  • Enabling or disabling propagation via MSN Messenger
  • Disabling propagation
  • Enabling or disabling propagation via AIM
  • Enabling or disabling propagation via AIM Triton
  • Reporting uptime of the bot
  • Retrieving running threads (its propagation thread like MSN Thread, Bot Killer Thread)
  • Downloading a file from the bot controller
  • Getting updates from the bot controller
  • Killing other bots
  • Launching a process

Network Connections

Attempts to connect to:

  • IRC SERVER: hub.[...]hacksite.us
  • Channel: ##xxxxxx
  • User: 'Currently Logged User Name' : 'Computer Name'






Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.

Scan and clean your PC




F-Secure Online Scanner will scan and clean your PC in just a few minutes for free