Home / malware Backdoor:W32/Zxshell.A
First posted on 24 December 2010.
Source: SecurityHomeAliases :
There are no other names known for Backdoor:W32/Zxshell.A.
Explanation :
Backdoor:W32/Zxshell.A is a DLL file with an exported function ("Install"), which is called to install the backdoor.
Additional DetailsBackdoor:W32/Zxshell.A is similar to other backdoor programs in providing a wide range of functionalities. Some of the functionalities it provides are:Upon execution, it will drop a rootkit driver (detected as Rootkit:W32/Zxshell.B)
- CA = Clone an account with "System" privilege
- CleanEvent = Clean event
- CloseFW = Close Windows Firewall
- End = End the backdoor program
- Execute = Execute program
- FileTime = Clone timestamp of a file
- FindPass = Find login password for an account
- FindDialPass = Find all the dialup account and password
- Help | ? = Show help file
- KeyLog = Capture keyboard command
- LoadDll = Load a DLL into a specified process
- PortScan = Do the port scan Ps = Show the process
- RunAs = Just like the Windows "Runas" command
- SC = Manipulate Windows Service Manager
- ShareShell = Share the shell
- ShutDown = Restart/Shutdown the system
- Sysinfo = Display system information
- SYNFlood = SYN attack
- TermSvc = Terminal service
- TransFile = Upload/Download file to FTP server
- Uninstall = Uninstall the backdoor
- User = User account manager
- ZXARPS = ZXARPS
- ZXFtpServer = Setup FTP server
- ZXNC = Just another copy of netcat
- ZXHttpProxy = Setup HTTP proxy agent
- ZXHttpServer = Setup HTTP server
- ZXPlug = install plugins
- ZXSockProxy = Socks 4 & 5 agent
- %windir%\system32\_amdevntas.sys
Registry Changes
In order to load the backdoor automatically during the system startup, it needs to install to the system launch point as a system service in the registries:It will connect to the remote host of the attacker machines. The URL of the remote host is set by the attacker to where the backdoor wants to connect to.
- HKLM\System\CurrentControlSet\Services\6to4
DisplayName = 6to4
ObjectName = LocalSystem
Start = 2
ErrorControl = 1
Type = 288
ImagePath = %SystemRoot%\System32\svchost.exe -k netsvcs HKLM\System\CurrentControlSet\Services\6to4\Security
Security =- HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
ServiceDll = %PATH_TO_BACKDOOR_DLL%- HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
ServiceDllUnloadOnStop = 0- HKLM\System\CurrentControlSet\Services\6to4\Control
ActiveService = 6to4Last update 24 December 2010