Threat Description

Backdoor:W32/SdBot.CKN

Details

Aliases: Backdoor:W32/SdBot.CKN
Category: Malware
Type: Backdoor
Platform: W32

Summary


A remote administration utility which bypasses normal security mechanisms to secretly control a program, computer or network.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.



Technical Details


Backdoor:W32/SdBot.CKN is a backdoor trojan that attempts to contact a remote server and allow a remote attacker access to the infected machine.

Installation

After the backdoor's file is run, it checks for the existence of Virtual Machines (VM) and immediately exits if any VM environment such as VMware is detected.If no VM environment is present, the backdoor decrypts its code and injects it into the explorer.exe process.

Activity

Once active, the backdoor attempts to connect to the following remote IRC server on TCP port 81:

  • [Removed].xn--mg-kka.com

The backdoor generates a random nickname and joins a password-protected channel:

  • #ohai

The backdoor then waits for commands from a channel operator. A remote hacker who is controlling the backdoor can do any of the following:

  • Update the backdoor's file from the Internet
  • Perform an SYN flood
  • Perform a Distributed Denial of Service (DDoS) attack
File System Changes

Creates these files:

  • ise32.exe
Process Changes

Creates these mutexes:

  • asd-6+094997__





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More