Home / malware Win32/Phdet
First posted on 11 December 2012.
Source: MicrosoftAliases :
Win32/Phdet is also known as DDos.BEnergy (Dr.Web), FDoS-BEnergy (McAfee).
Explanation :
Win32/Phdet is a family of backdoor trojans that are used to perform distributed denial of service (DDoS) attacks against specified targets.
Installation
When Win32/Phdet is run, it copies itself to the <system folder>. The file name used may differ across variants.
Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:\WinNT\System32"; and for XP, Vista, 7, and 8 it is "C:\Windows\System32".
In the wild, we have observed one variant using the file name "mssrv32.exe".
Win32/Phdet registers its copy as a service to ensure that its copy runs at each Windows start. For example, it may set the following values in the registry:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\msupdate
Sets value: "ImagePath"
With data: "<system folder>\<malware file name>", for example "C:Windows/System32\mssrv32.exe"
Sets value: "DisplayName"
With data: "Microsoft security update service"
Sets value: "Description"
With data: "This service downloading and installing Windows security updates"
Sets value: "ObjectName"
With data: "LocalSystem"
Sets value: "Start"
With data: "2"
Sets value: "ErrorControl"
With data: "0"
Sets value: "Type"
With data: "16"
Payload
Performs denial of service attacks
Win32/Phdet allows unauthorized access and control of an affected computer. Using this backdoor, an attacker can perform DDoS attacks against specified targets. A remote attacker could perform the following actions on your computer:
- Perform "flood" (DDoS) attacks using the network protocols ICMP, SYN, HTTP or UDP
- Disable the trojan
- Uninstall the trojan
- Run a specified URL using Internet Explorer
Contacts remote host
Win32/Phdet may also connect to a remote host for instructions, and to send information about your computer (such as your hard drive's serial number). We have observed one sample contacting "<removed>-off.ru" for this purpose.
Analysis by Jireh Sanico and Scott Molenkamp
Last update 11 December 2012