Backdoor:W32/SdBot.MB

Classification

Category :

Malware

Type :

Backdoor

Aliases :

SdBot.MB

Summary

Backdoor:W32/SDBot.MB allows a remote attacker to control the infected machine by sending specific commands via IRC channels.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

CAUTION Manual disinfection is a risky process; it is recommended only for advanced users.

Manual disinfection for SdBot.MB requires renaming of an infected file named SNDCFG16.EXE located in Windows System folder and restarting a system. Please note that the backdoor's file has read-only, system and hidden attributes, so Windows Explorer has to be configured to show such files.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

This backdoor steals registration codes of popular games and can work as a keylogger. It can also steal data, spread to local network and to computers vulnerable to exploits.

This SDBot variant was first found on May 12th, 2004 in Finland.

Installation

The backdoor's file is a PE executable about 93 kilobytes long, packed with Yoda and PECompact file compressors. When the backdoor's file is started, it copies itself as SNDCFG16.EXE to Windows System folder, and sets hidden, system and read-only attributes for itself.

The backdoor creates a number of registry keys. It will also monitor the registry for changes and recreate these keys if they are deleted or modified.

Activity

SDBot.MB kills the processes of security and anti-virus software and also processes of certain malware (for example Bagle). Processes with the following names are killed:

  • regedit.exe
  • msconfig.exe
  • netstat.exe
  • msblast.exe
  • zapro.exe
  • navw32.exe
  • navapw32.exe
  • zonealarm.exe
  • wincfg32.exetaskmon.exe
  • PandaAVEngine.exe
  • sysinfo.exe
  • mscvb32.exe
  • MSBLAST.exe
  • teekids.exe
  • Penis32.exe
  • bbeagle.exe
  • SysMonXP.exe
  • winupd.exe
  • winsys.exe
  • ssate.exe
  • rate.exe
  • d3dupdate.exe
  • irun4.exe
  • i11r54n4.exe

The backdoor can scan for vulnerable computers using different types of exploits and tries to locate other backdoors installed on remote hosts. Here's the list of scanner capabilities:

  • WebDav (port 80)
  • NetBios (port 139)
  • NTPass (port 445)
  • DCom (ports 135, 1025)
  • DCom2 (port 135)
  • MSSQL (port 1433)
  • LSASS (port 445)
  • UPNP (port 5000)
  • Optix backdoor (port 3140)
  • Bagle backdoor (port 2745)
  • Kuang backdoor (port 17300)
  • Mydoom backdoor (port 3127)
  • NetDevil backdoor (port 903)
  • SubSeven backdoor (port 27347)
  • DameWare remote management software (port 6129)

The backdoor starts IDENTD server on port 113. A hacker can control the backdoor via a bot that it creates in a certain IRC channel. Backdoor capabilities are the following:

  • start HTTP server on an infected computer
  • start FTP server on an infected computer
  • scan for vulnerable computers (open ports and exploits)
  • make use of exploits and spread to remote computers
  • start/stop keylogger
  • get system information including information about OS, network and drives
  • operate backdoor's bot (nick change, dcc send/receive, join/part channels, etc.)
  • perform DDoS (Distributed Denial of Service) attack, SYN, ICMP, UDP flood
  • find, download and run files
  • search for passwords
  • start/stop remote services
  • create/delete remote shares
  • flush DNS cache
  • ping any host
  • list, start and kill processes
  • sniff network traffic
  • start remote command shell
  • capture video from a webcam
  • capture a screenshot
  • redirect traffic on certain ports
  • perform portscan
  • send emails (work as an email proxy)
  • open a URL with default web browser

SDBot.MB steals CD keys for the following games if they are installed on an infected computer:

  • Counter-Strike (Retail)
  • The Gladiators
  • Gunman Chronicles
  • Half-Life
  • Industry Giant 2
  • Legends of Might and Magic
  • Soldiers Of Anarchy
  • Unreal Tournament 2003
  • Unreal Tournament 2004
  • IGI 2: Covert Strike
  • Freedom Force
  • Battlefield 1942
  • Battlefield 1942 (Road To Rome)
  • Battlefield 1942 (Secret Weapons of WWII)
  • Battlefield Vietnam
  • Black and White
  • Command and Conquer: Generals (Zero Hour)
  • James Bond 007: Nightfire
  • Command and Conquer: Generals
  • Global Operations
  • Medal of Honor: Allied Assault
  • Medal of Honor: Allied Assault: Breakthrough
  • Medal of Honor: Allied Assault: Spearhead
  • Need For Speed Hot Pursuit 2
  • Need For Speed: Underground
  • Shogun: Total War: Warlord Edition
  • FIFA 2002
  • FIFA 2003
  • NHL 2002
  • NHL 2003
  • Nascar Racing 2002
  • Nascar Racing 2003
  • Rainbow Six III RavenShield
  • Command and Conquer: Tiberian Sun
  • Command and Conquer: Red Alert
  • Command and Conquer: Red Alert 2
  • NOX
  • Chrome
  • Hidden & Dangerous 2
  • Soldier of Fortune II - Double Helix
  • Neverwinter Nights
  • Neverwinter Nights (Shadows of Undrentide)
  • Neverwinter Nights (Hordes of the Underdark)

Also the backdoor steals the Microsoft Windows Product ID.