Home > Threat descriptions >



Category: Malware

Type: Backdoor

Aliases: Backdoor.Win32.IRCBot.dig


A remote administration tool (RAT) which bypasses normal security mechanisms to secretly control a program, computer or network.


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

This malware may arrive as a file downloaded from a malicious website, or as a message received over an instant messaging application such as MSN messenger, AIM, or AIM Triton.


Upon execution, the malware will drop a copy of itself into the Windows folder as:

  • %windir%\servicean.exe

It creates an entry in the registry, which allows the malware to start automatically:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Windows svchost = servicean.exe

It then checks the following processes:

  • svchost.exe
  • explorer.exe
  • hidserv.exe
  • winlogon.exe
  • services.exe
  • crss.exe

The malware will search the process memory for the following strings:

  • RFB 003.008
  • RXBot
  • [MAIN]
  • [SCAN]
  • [FTP]
  • NZM
  • scan.stop
  • NZM/ST
  • scanall
  • YaBot

It will terminate the processes in the process memory if found.


It then immediately attempts to connect to a specific channel on a specific IRC server, which the unauthorized remote user is using to access and control any infected machines.

Once connected to the IRC server, the infected machine is ready to accept and execute commands from the remote user. The remote user can perform a variety of actions such as:

  • Enabling or disabling propagation via MSN Messenger
  • Disabling propagation
  • Enabling or disabling propagation via AIM
  • Enabling or disabling propagation via AIM Triton
  • Reporting uptime of the bot
  • Retrieving running threads (its propagation thread like MSN Thread, Bot Killer Thread)
  • Downloading a file from the bot controller
  • Getting updates from the bot controller
  • Killing other bots
  • Launching a process
Network Connections

Attempts to connect to:

  • IRC SERVER: hub.[...]hacksite.us
  • Channel: ##xxxxxx
  • User: 'Currently Logged User Name' : 'Computer Name'