Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/12/2012
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:22.016 Bytes
MD5 checksum:5e921cb1e6b516a2931038505eae5354
VDF version:

 General Method of propagation:
   • No own spreading routine

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Drops a malicious file
   • Registry modification
   • Third party control

 Files It copies itself to the following location:
   • %PROGRAM FILES%\system32\ssh.exe

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "svchost"="%SYSDIR%\ssh.exe"

 Backdoor The following port is opened:

%executed file%.exe on TCP port 50507 in order to provide backdoor capabilities.

Remote control capabilities:
    • Open remote shell

 File details Programming language:
The malware program was written in Delphi.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Catalin Jora on Tuesday, August 16, 2005
Description updated by Catalin Jora on Friday, August 26, 2005

Back . . . .