Classification

Category :

Malware

Type :

-

Aliases :

Randex.Q, W32.Randex.Q, W32/Randex.Q, Worm.Randex.Q, Backdoor.SDBot.gen

Summary

Randex (also known as SDBot) is a backdoor with network worm capabilities. This variant of Randex appeared on 28th of November 2003. It is functionally similar to previous versions, but has less features.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The backdoor's file is a Windows PE executable 37376 bytes long. It is compressed with patched UPX file compressor.

When activated, the backdoor gets API addresses of different Windows functions and checks whether it is already installed on this computer. If not, the backdoor copies its file as 'msrundll.exe' to Windows System directory and creates a startup key for it in the Registry:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"Microsoft Windows Kernel Functionalities" = "msrundll.exe"
[HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
 "Microsoft Windows Kernel Functionalities" = "msrundll.exe"

After the backdoor starts, it tries to connect to an IRC server (one hardcoded name) and creates a bot in the specific channel (hardcoded name) on this server. Through this bot a hacker can control the backdoor's behaviour. A hacker can perform the following actions:

1. Log in and out of the bot (requires a password)
2. Terminate own process
3. Generate another random nickname for the bot
4. Connect, reconnect and disconnect from IRC server
5. Show bot status
6. Show bot ID
7. Show threads list
8. Show aliases list
9. Show log file
10. Start and stop sniffer functionality
11. Show network info
12. Show system information
13. Start and stop NTScan (spread to network)
14. Remove the bot
15. Delete the PAYLOAD,DAT file
16. Change bot's nickname
17. Join/part channels
18. Kill specific threads
19. Send SYN packets
20. Add aliases
21. Send private messages
22. Change channel mode
23. Join/part specific channel in a cycle
24. Update the backdoor
25. Start a specific file
26. Create clones
27. Download files
28. Show infected computer's IP address and connection type
 

When instructed to do a NTScan, the backdoor copies itself to Windows System folder as 'ms093upd.dat', generates random IP addresses and tries to connect to them. The backdoor tries to retrieve network user names and connect using them, but in case this fails, it will try to connect as Administrator.

The backdoor uses the following passwords to connect to remote computers:

admin
root
1
111
123
1234
123456
654321
!@#$
asdf
asdfgh
!@#$%
!@#$%^
!@#$%^&
!@#$%^&*
Guest
Gast
Administrateur
server
Administrator
Beheerder
super
user
password
secret
xp
nt
me
love
girl
iloveyou
tits
pussy
2600
2800
hacker
leet
l337
 

Once connected the backdoor tries to access to IPC$ share on remote computer and to copy itself to the following locations as 'MSL32.exe' and 'MSL3232.exe' files:

\Admin$\system32\MSL32.exe
\c$\winnt\system32\MSL3232.exe
 

The above locations correspond to System32 folders of NT-based operating systems.

After copying its file, the backdoor creates a scheduled network task to start the copied infected file on remote computer. When this happens, a remote computer becomes infected with the backdoor.

F-Secure Anti-Virus already detects this worm generically as 'Backdoor.SDBot.gen'.