Home / malware Backdoor:Win32/Mdmbot.B
First posted on 18 January 2010.
Source: SecurityHomeAliases :
Backdoor:Win32/Mdmbot.B is also known as Trojan.Agent.AOGG (BitDefender), Generic Spy.e (McAfee), Trojan.Hydraq (Symantec).
Explanation :
Backdoor:Win32/Mdmbot.B is a trojan that allows unauthorized access and control of an affected computer.
Top
Backdoor:Win32/Mdmbot.B is a trojan that allows unauthorized access and control of an affected computer.
Installation
In the wild, Backdoor:Win32/Mdmbot.B has been distributed with the filename rasmon.dll. When run, it copies itself to %temp%\c_1758.nls and modifies the registry to make it appear as though it is running as a system service: Adds value: "ImagePath"
With data: "<system folder>\svchost.exe -k netsvcs"To subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\Ras[4 random characters] Adds value: "ServiceDll"
With data: "%temp%\c_1758.nls"To subkey: HKLM\SYSTEM\CurrentControlSet\Services\RaS[4 random characters]\Parameters After the malicious service is started, it deletes the entry: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\Ras[4 random characters] This prevents the affected user from properly stopping the malicious service. Backdoor:Win32/Mdmbot.B also creates the following registry entries in order to store configuration information:HKLM\Software\Sun\1.1.2\"IsoTp" HKLM\Software\Sun\1.1.2\"AppleTlk"
Payload
Allows backdoor access and controlBackdoor:Win32/Mdmbot.B checks to see if the following files exist on the affected computer:<system folder>\acelpvc.dll <system folder>\VedioDriver.dll These files may be detected as the program RemoteAccess:Win32/RealVNC. If these files exist then Backdoor:Win32/Mdmbot.B utilizes them to attain remote backdoor access to the affected computer. Using this backdoor an attacker can perform a number of different actions, including:Deleting itself Clearing the system log Deleting the file <system folder>\drivers\etc\networks.ics Retrieving CPU information from the following registry entry:
HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0Shut down the affected computer Connects to remote hostsBackdoor:Win32/Mdmbot.B may contact a number of specified remote hosts. Commonly, malware may contact a remote host for the following purposes:To report a new infection to its author To receive configuration or other data To download and execute arbitrary files (including updates or additional malware) To receive instruction from a remote attacker To upload data taken from the affected computer
Analysis by Tim LiuLast update 18 January 2010