Home / malware Backdoor.IRC.Snyd.A
First posted on 21 November 2011.
Source: BitDefenderAliases :
Backdoor.IRC.Snyd.A is also known as Backdoor.Win32.Breplibot.b, (Kaspersky.
Explanation :
This is an IRC backdoor that was spammed in an e-mail withe the following body:
Hello,
Your photograph was forwarded to us as part of an article we are publishing for our December edition of Total Business Monthly.
Can you check over the format and get back to us with your approval or any changes?
If the picture is not to your liking then please send a preferred one.
We have attached the photo with the article here.
Kind regards,
Jamie Andrews
Editor
www.TotalBusiness.co.uk
**********************************************
The Professional Development Institute
And the attachment: Article+Photos.exe
The backdoor uses the Sony DRM copy protection system in order to hide its presence in the system.
When executed it does the following actions:
- It copies itself as:
%sysdir% $sys$drv.exe
- It should add the following registry keys:
HKCUSoftwareMicrosoftWindowsCurrentVersionRun$sys$drv with value
%sysdir%$sys$drv.exe
and
HKLMSoftwareMicrosoftWindowsCurrentVersionRun$sys$drv with value
%sysdir%$sys$drv.exe
but due to a bug in code, instead of SoftwareMicrosoftWindowsCurrentVersionRun
the registry keys are
HKLMkbpsevaXImgvkwkbpXSmj`kswXGqvvajpRavwmkjXVqj$sys$drv
HKCUkbpsevaXImgvkwkbpXSmj`kswXGqvvajpRavwmkjXVqj$sys$drv
- It drops and executes the following files:
%TEMP%xxx.bat and
%TEMP%yyy.bat where xxx and yyy are two random numbers.
xxx.bat tryes to disable firewall checking for the $sys$drv.exe
yyy.bat waits for the trojan to end and deletes it.
- It connects to one of 5 hardcoded IRC servers on port 8080.
- It waits for a small list of posible commands on channel #sony
The backdoor contains the following string: „SonyEnabled”Last update 21 November 2011