Home / malware Backdoor:Win32/IRCbot.FY
First posted on 18 March 2019.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/IRCbot.FY.
Explanation :
Backdoor:Win32/IRCbot.FY is a member of Win32/IRCbot - a broad family of backdoor trojans that allows unauthorized access and control of an affected computer by a remote attacker via IRC. Installation When executed, Backdoor:Win32/IRCbot.FY copies itself to c:documents and settingsadministratorapplication datalsass.exe.
The malware modifies the following registry entries to ensure that its copy executes at each Windows start:
Adds value: "Microsoft"
With data: "c:documents and settingsadministratorapplication datalsass.exe"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun
Adds value: "Microsoft"
With data: "c:documents and settingsadministratorapplication datalsass.exe"
To subkey: HKCUSoftwareMicrosoftwindowscurrentversion
un Spreads via… Removable drives Backdoor:Win32/IRCbot.FY copies itself to the following locations on removable drives:
:updatesdriverssystem.exe
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system, so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
Note: This worm was observed to write an executable and create an autorun.inf file on a targeted drive in our automated testing environment. This is particularly common malware behavior, generally utilized in order to spread malware from computer to computer. It should also be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs.
The malware may also create the following files on targeted drives when spreading:
:updatesdriversdesktop.ini Payload Modifies system security settings Backdoor:Win32/IRCbot.FY adds itself to the list of applications that are authorized to access the Internet without being stopped by the Firewall, by making the following registry modification:
Adds value: "Microsoft"
With data: "c:documents and settingsadministratorapplication datalsass.exe"
To subkey: HKLMSYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList
Allows backdoor access and control The malware allows unauthorized access and control of an affected computer. An attacker can perform any number of different actions on an affected computer using Backdoor:Win32/IRCbot.FY. This could include, but is not limited to, the following actions:
Download and execute arbitrary files Upload files Spread to other computers using various methods of propagation Log keystrokes or steal sensitive data Modify system settings Run or terminate applications Delete files
This malware description was produced and published using our automated analysis system's examination of file SHA1 39acb10bbd6ea70a017efc3cddad25f1a377bf9c.Last update 18 March 2019