Home > Threat descriptions >

Backdoor:W32/VanBot.BR

Classification

Category: Malware

Type: Backdoor

Aliases: Backdoor:W32/VanBot.BR

Summary


VanBot.BR is a family of IRC bot-based backdoors that can be commanded to copy itself to remote computers with the help of known exploits.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


VanBot.BR is a family of IRC bot-based backdoors that can be commanded to copy itself to remote computers with the help of known exploits. When it arrives on an infected computer it copies itself to the Windows System folder with the name of runapidll.exe and creates several startup strings in the Registry:

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Dll = runapidll.exe
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices Microsoft Dll = runapidll.exe

It creates the following mutex while running and active in memory:

  • rx-asn-2-re-worked

Once active, the backdoor connects to IRC servers and joins a particular IRC channel to listen for remote commands from the attacker.As common with IRC-based bots, VanBot.BR can do any of the following:

  • Create remote command shell
  • Delete files
  • Download and run files
  • Gather infected system information
  • Join and part IRC channels, change nicks, change server
  • List and terminate processes including security related software products
  • Log keystrokes
  • Monitor and sniff network traffic
  • Open a mail proxy, http and tftp server for file transfers
  • Perform DDOS and send ICMP and SYN packets
  • Report bot uptime to a hacker
  • Save a screen and webcam image capture
  • Scan for vulnerable computers and try to get access to IPC$ and ADMIN$ shares by performing a dictionary attack then spread to them
  • Send current IP address to a hacker
  • Steal user credentials and PC games private keys
  • Visit a remote website