Backdoor:W32/SDBot.MB allows a remote attacker to control the infected machine by sending specific commands via IRC channels.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Caution: Manual disinfection is a risky process; it is recommended only for advanced users.
Manual disinfection for SdBot.MB requires renaming of an infected file named SNDCFG16.EXE located in Windows System folder and restarting a system. Please note that the backdoor's file has read-only, system and hidden attributes, so Windows Explorer has to be configured to show such files.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.
For general instructions on disinfecting a local network infection, please see Eliminating A Local Network Outbreak.
This backdoor steals registration codes of popular games and can work as a keylogger. It can also steal data, spread to local network and to computers vulnerable to exploits.
This SDBot variant was first found on May 12th, 2004 in Finland.
The backdoor's file is a PE executable about 93 kilobytes long, packed with Yoda and PECompact file compressors. When the backdoor's file is started, it copies itself as SNDCFG16.EXE to Windows System folder, and sets hidden, system and read-only attributes for itself.
The backdoor creates a number of registry keys. It will also monitor the registry for changes and recreate these keys if they are deleted or modified.
SDBot.MB kills the processes of security and anti-virus software and also processes of certain malware (for example Bagle). Processes with the following names are killed:
The backdoor can scan for vulnerable computers using different types of exploits and tries to locate other backdoors installed on remote hosts. Here's the list of scanner capabilities:
The backdoor starts IDENTD server on port 113. A hacker can control the backdoor via a bot that it creates in a certain IRC channel. Backdoor capabilities are the following:
SDBot.MB steals CD keys for the following games if they are installed on an infected computer:
Also the backdoor steals the Microsoft Windows Product ID.