Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/LiteBot.A
Date discovered:13/12/2012
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:14.876 Bytes
MD5 checksum:4d0d837d3d31286d0ab7e72973554d5f
VDF version:7.11.53.216

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Symantec: IRC.Backdoor.Trojan
   •  Mcafee: IRC-Itlebot
   •  Kaspersky: Backdoor.Win32.LiteBot.a
   •  TrendMicro: BKDR_LITBOT.A
   •  Sophos: Troj/Litebot-A
   •  VirusBuster: Trojan.Litebot.A
   •  Bitdefender: Backdoor.IRCBot.Y


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP


Side effects:
   • Registry modification
   • Third party control

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Litebot"="<%executed file%>"

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: **********.skene.net
Port: 6667
Channel: ##begonia##
Nickname: LB%eight-digit random character string%


– Furthermore it has the ability to perform actions such as:
    • connect to IRC server
    • Download file
    • Execute file
    • Join IRC channel
    • Leave IRC channel

 Backdoor The following port is opened:

%executed file% on TCP port 113

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Alexandru Tudor on Tuesday, August 9, 2005
Description updated by Cosmin Ancuta on Wednesday, August 24, 2005

Back . . . .