A remote administration utility which bypasses normal security mechanisms to secretly control a program, computer or network.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Backdoor:W32/SdBot.CKN is a backdoor trojan that attempts to contact a remote server and allow a remote attacker access to the infected machine.
After the backdoor's file is run, it checks for the existence of Virtual Machines (VM) and immediately exits if any VM environment such as VMware is detected.If no VM environment is present, the backdoor decrypts its code and injects it into the explorer.exe process.
Once active, the backdoor attempts to connect to the following remote IRC server on TCP port 81:
The backdoor generates a random nickname and joins a password-protected channel:
The backdoor then waits for commands from a channel operator. A remote hacker who is controlling the backdoor can do any of the following:
- Update the backdoor's file from the Internet
- Perform an SYN flood
- Perform a Distributed Denial of Service (DDoS) attack
File System Changes
Creates these files:
Creates these mutexes: