RBot represents a large family of backdoors - remote access tools. These tools allow for the contol of a victims' computers from a remote location by sending specific commands via IRC channels. These backdoors can also steal data and spread to computers vulnerable to exploits.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
RBot represents a large family of backdoors - remote access tools. These tools allow for the contol of a victims' computers from a remote location by sending specific commands via IRC channels. These backdoors can also steal data and spread to computers vulnerable to exploits.
Upon execution, it creates a copy of itself in the Windows folder and run from this location:
It will terminate certain services and applications such as the system's firewall, security and antivirus applications.
Rbot.BIC further installs itself to run during system startup by modifying the system registry:
The following IRC server and ports are used by the backdoor:
The backdoor joins the following password-protected IRC channels:
A hacker can send commands to the bots on the IRC channel to control the infected computers. Several tasks can be performed, including the following:
When spreading, the bot can exploit the following vulnerabilities:
RBot.BIC disables Windows Firewall and Windows Update, and terminates active security related applications that contains the following strings in their filenames:
It uses the following user accounts:
- to connect to the target machine's hidden shares:
It also tries to brute force its way into the Administrator Group accounts by using the following list of passwords:
Once a target Windows machine has successfully been exploited, it will create and execute a Visual Basic Script (VBS) file remotely to download and execute a copy of this malware.
It also spies on the user by logging mouse and keyboard events when a specific window with the following strings is active:
It accepts the following BOT commands:
RBot.BIC is also able to send itself in Instant Messages with the following details:
Ask questions in our Community.
Check the user guide for instructions.
Chat with with or call an agent.
Submit a file or URL for analysis.