Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/12/2012
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:12.832 Bytes
MD5 checksum:6baed5ccc533405f791e413de7b569ad
VDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Backdoor.Sdbot
   •  Mcafee: W32/
   •  Kaspersky: Backdoor.Win32.SdBot.a
   •  TrendMicro: BKDR_SDBOT.05.AX
   •  Grisoft: IRC/BackDoor.SdBot

Platforms / OS:
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Downloads files
   • Registry modification
   • Steals information
   • Third party control

 Files It copies itself to the following location:
   • %SYSDIR%\Explorer .exe

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Explorer"="Explorer .exe"

The following registry key is added:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
   • "Windows Explorer"="Explorer .exe"

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: **********
Port: 6969
Channel: SDR-002
Nickname: SDR-%five-digit random character string%

– Furthermore it has the ability to perform actions such as:
    • Download file
    • Terminate process

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Victor Tone on Tuesday, August 16, 2005
Description updated by Victor Tone on Friday, August 26, 2005

Back . . . .