Home / malware Backdoor:Win32/IRCbot.FL
First posted on 09 August 2011.
Source: SecurityHomeAliases :
There are no other names known for Backdoor:Win32/IRCbot.FL.
Explanation :
Backdoor:Win32/IRCbot.FL allows unauthorized access and control of an infected computer by connecting to an IRC server and awaiting commands that are issued by a remote attacker. For example, it may be commanded to download and execute arbitrary files or participate in Distributed Denial of Service attacks. The malware also spreads to shared drives as a file named "debug.exe" and terminates a security process.
Top
Backdoor:Win32/IRCbot.FL allows unauthorized access and control of an infected computer by connecting to an IRC server and awaiting commands that are issued by a remote attacker. For example, it may be commanded to download and execute arbitrary files or participate in Distributed Denial of Service attacks. The malware also spreads to shared drives as a file named "debug.exe" and terminates a security process.
Installation
When run, Backdoor:Win32/IRCbot.FL copies itself as a 'read only', 'hidden', 'system' file to %appdata%\winlogon.exe, and launches the new copy.
It creates the following registry entries to ensure that it runs at each system start:
In subkeys:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows
HKLM\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
Sets value: €œwinlogon€Â
With data: €œ%appdata%\winlogon.exe€Â
Spreads via€¦
Shared drives
Backdoor:Win32/IRCBot.FL copies itself as "debug.exe" to all shared drives discovered on the infected computer, for example:
admin$\debug.exe
c$\debug.exe
d$\debug.exe
and so on.
Payload
Backdoor functionality
The malware connects on port 5992 to an IRC server with IP address 108.59.254.180 and joins the channel "#indi" using the key "3p1cW4r5" (epicwars). Once connected, Backdoor:Win32/IRCbot.FL awaits commands from a remote attacker.
Terminates processes
Backdoor:Win32/IRCbot.FL terminates the process "MsMpEng.exe", a core component of Microsoft antimalware software including Microsoft Security Essentials and Forefront Endpoint Protection.
Vincent Tiu
Last update 09 August 2011