Home / malware Backdoor:Win32/Faitypelf.B
First posted on 15 December 2009.
Source: SecurityHomeAliases :
Backdoor:Win32/Faitypelf.B is also known as MSN Bot (other), Server-Proxy.Win32.RCService (Ikarus).
Explanation :
Backdoor:Win32/Faitypelf.B is a backdoor trojan that allows remote access and control. The trojan receives communication via MSN Messenger protocol from a remote attacker to carry out certain commands.
Top
Backdoor:Win32/Faitypelf.B is a backdoor trojan that allows remote access and control. The trojan receives communication via MSN Messenger protocol from a remote attacker to carry out certain commands. InstallationThis trojan may be installed by other malware or manually, by a user in a command console. The registry may be modified to run the trojan as a service using parameters specified during installation. Adds value: "<Win32/Faitypelf.B file name>"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services Adds value: "ImagePath"
With data: "<Win32/Faitypelf.B path and file name>"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\<Win32/Faitypelf.B filename> The trojan then connects to MSN Messenger servers using predefined credentials supplied by the installer and awaits connection from an attacker. Payload Allows backdoor access and controlBackdoor:Win32/Faitypelf.B functions as a MSN Messenger client and awaits connection from an attacker. The trojan responds to various commands sent from an attacker such as the following:kill processes execute programs list current processes select directory for saving files (downloads and log files) set MSN display name get system information (computer name, OS version, CPU type, logged in/locked status) retrieve proxy settings scan winlogon.exe memory for password (Windows 2000 only) send Ctrl + Alt + Del shutdown restart logoff lock take snapshot of the screen download files via HTTP Additional InformationA registry value is added to serve as an installation marker: Adds value: "msnbot"
With data: "<installer's choice>"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion Some messages sent by the trojan are in simplified Chinese.
Analysis by Shali HsiehLast update 15 December 2009