Classification

Category :

Malware

Type :

-

Aliases :

SdBot.MD, Backdoor.SdBot.md, SDBot

Summary

SdBot represents the large family of backdoors - hacker's remote access tools.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

These tools allow to contol victims' computers remotely by sending specific commands via IRC channels. Also these backdoors can steal data, spread to local network and to computers vulnerable to exploits.

This SDBot variant was first found on May 13th, 2004 in Finland. It uses different exploits including the MSSQL and LSASS exploits to spread to vulnerable computers. The backdoor also can install security patches on an operating system and scan for active ftp servers. Additionally the backdoor removes startup Registry keys for 3 Sasser worm variants.

The backdoor's file is a PE executable about 32 kilobytes long, packed with a modified UPX file compressor.

When the backdoor's file is started, it copies itself as DESKTOP.EXE to Windows System folder and then creates the startup key in the Registry:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"desktop"="%WinSysDir%\desktop.exe"

where %WinSysDir% represents the Windows System folder name. The backdoor also creates the following Registry keys:

[HKLM\SOFTWARE\Microsoft\MSSQLServer\Client\ConnectTo]
"DSQUERY"
"DBMSSOCN"
[HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]
"AutoShareServer" = DWORD:0
"AutoShareWks" = DWORD:0
[HKLM\SYSTEM\CurrentControlSet\Control\Lsa]
"restrictanonymous" = DWORD:1
[HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters]
"DisableWebDAV" = DWORD:1
"MaxClientRequestBuffer" = DWORD:4000

Then the backdoor installs the ecurity patch KB835732 on Windows 2000 and XP computers by downloading a language-specific version from a Microsoft site and activating it. More information about the security patch can be found here: https://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

The backdoor connects to one of the following IRC servers and creates a bot there:

knix-irc.hopto.org
irc.knix.25u.com
knix-irc2.hopto.org
knix.afraid.org

The following IRC channels are used:

#virtualz
#scanlog

The backdoor can be controled via a bot that it creates. A remote hacker can perform the following actions:

* initialize for spreading cycle
* select spreading technique (see below)
* remove spreading technique
* select IP address range for scan
* remove IP address range for scan
* start spreading cycle
* stop spreading cycle
* get spreading cycle status
* create a remote shell
* autoupdate itself
* uninstall itself
* download files
* start files
* execute a command
* get bot information
* switch to idle mode
* delete Registry keys for 3 Sasser worm variants
* show log file

The backdoor can spread using the following exploits and applications:

ipc (remote shares)
mssql (SQL servers)
mssql_udp
dcom1 (DCOM RPC)
real_serv
dame_ware (remote administration software)
ms04011 (LSASS)
ftp_scan (remote ftp sites)

This variant of SDBot performs a dictionary attack to get access to remote hosts. It uses the following list of logins and passwords:

sa
sql
admin
Administrator
test
demo
database
Administrator
Administrador
Amministratore
Administrateur
Administrat
Beheerder
guest
Gast
G?st
Invitado
Visitatore
admin
webmaster
web
www
server
data
account
backup
demo
test
access
operator
oper
local
user
master
student
pwrchute
root
admin
demo
test
guest
webmaster
web
www
server
data
account
backup
access
sysadm
sysadmin
manager
Administrator
Administrador
Amministratore
Administrateur
Administrat
Beheerder
sysop
supervisor
operator
oper
local
user
master
adm
devadmin
sysmgr
sysman
testuser
systest
%UserName%
%UserName%1
%UserName%12
%UserName%123
%UserName%1234
%UserName%12345
%UserName%pass
%UserName%qwerty
%UserName%qwert
%UserName%qwer
%UserName%abcd
%UserName%abc
%UserName%asdf
%UserName%asd
1%UserName%
12%UserName%
123%UserName%
1234%UserName%
12345%UserName%
abc%UserName%
abcd%UserName%
qwerty%UserName%
asdf%UserName%
!@#$%UserName%
!@#%UserName%
!@%UserName%
!%UserName%
%UserName%!@#$
%UserName%!@#
%UserName%!@
%UserName%!
1
11
111
1111
11111
111111
1111111
11111111
12
123
1234
12345
123456
1234567
12345678
654321
54321
4321
321
123123
12341234
31337
1337
00000000
88888888
5201314
1234qwer
123qwe
123abc
123asd
abc123
abcd
asdf
asdfgh
Administrator
admin
root
pass
passwd
password
super
master
backup
pass
test
user
temp
secret
computer
demo
windows
monitor
manager
operator
oper
local
server
share
full
digital
einstein
guess
system
sql
database
sybase
internet
locked
access
qwerty
newpass
pasword
guest
access
keyboard
windows
mouse
rules
linux

This is quite an unusual backdoor indeed. It spreads around, kills Sasser worm and installs security patches. But it still remains a backdoor.