Home / malwarePDF  

Backdoor:Win32/Cycbot.B


First posted on 15 October 2010.
Source: SecurityHome

Aliases :

Backdoor:Win32/Cycbot.B is also known as TROJ_FAKELRT.SMC (Trend Micro).

Explanation :

Backdoor:Win32/Cycbot.B is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers.
Top

Backdoor:Win32/Cycbot.B is a backdoor trojan that allows attackers unauthorized access and control of an affected computer. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel to receive commands from attackers. Commands can instruct the trojan to spread to other computers by scanning for network shares with weak passwords, exploiting Windows vulnerabilities, or possibly spreading through backdoor ports opened by other families of malicious software. The trojan may also allow attackers to perform other backdoor functions, such as launching denial of service (DoS) attacks and retrieving system information from infected computers. Installation When executed, Backdoor:Win32/Cycbot.B copies itself to c:\documents and settings\administrator\application data\microsoft\svchost.exe.
The malware modifies the following registry entries to ensure that its copy executes at each Windows start:

Adds value: "svchost"
With data: "c:\documents and settings\administrator\application data\microsoft\svchost.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
The malware creates the following files on an affected computer:

  • c:\documents and settings\administrator\application data\microsoft\stor.cfg
  • c:\documents and settings\administrator\application data\microsoft\windows\shell.exe
  • c:\documents and settings\administrator\local settings\temp\dwm.exe
  • Payload Allows backdoor access and control Backdoor:Win32/Cycbot.B allows unauthorized access and control of an affected computer. An attacker can perform any number of different actions on an affected computer using Backdoor:Win32/Cycbot.B. This could include, but is not limited to, the following actions:
  • Download and execute arbitrary files
  • Upload files
  • Spread to other computers using various methods of propagation
  • Log keystrokes or steal sensitive data
  • Modify system settings
  • Run or terminate applications
  • Delete files

  • This malware description was produced and published using our automated analysis system's examination of file SHA1 84561817890733bfa2307cd1ee902216a27f10b1.

    Last update 15 October 2010

     

    TOP