Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/Agent.adqk
Date discovered:11/02/2009
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Medium
Static file:Yes
File size:522.240 Bytes
MD5 checksum:8bb79f893731b93813a09091137908fc
IVDF version:7.01.02.06 - Wednesday, February 11, 2009

 General Methods of propagation:
    Autorun feature
   • Local network
    Messenger


Aliases:
   •  Panda: W32/IRCBot.CKA.worm
   •  Eset: Win32/AutoRun.Agent.JD
   •  Bitdefender: Trojan.Generic.1704532


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification
   • Third party control

 Files It copies itself to the following locations:
   • %SYSDIR%\wmiprvse.exe
   • %drive%\RECYCLER\%CLSID%\openfiles.exe



The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\RECYCLER\%CLSID%\Desktop.ini

 Registry The following registry key is added in order to run the process after reboot:

[HKLM\SYSTEM\CurrentControlSet\Services\WMIMGIN]
   • "Description"="Provides control and info about management."
   • "DisplayName"="WMI Management App"
   • "ErrorControl"=dword:0x00000000
   • "FailureActions"=hex:0A,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,53,00,65,00,01,00,00,00,B8,0B,00,00
   • "ImagePath"=""%SYSDIR%\wmiprvse.exe""
   • "ObjectName"="LocalSystem"
   • "Start"=dword:0x00000002
   • "Type"=dword:0x00000110



The following registry key is changed:

[HKLM\SYSTEM\CurrentControlSet\Control]
   New value:
   • "WaitToKillServiceTimeout"="7000"

 Messenger It is spreading via Messenger. The characteristics are described below:

 AIM Messenger
 MSN Messenger

 Network Infection Exploit:
It makes use of the following Exploits:
– MS04-007 (ASN.1 Vulnerability)
 MS06-040 (Vulnerability in Server Service)


IP address generation:
It creates random IP addresses while it keeps the first octet from its own address. Afterwards it tries to establish a connection with the created addresses.


Remote execution:
It attempts to schedule a remote execution of the malware, on the newly infected machine. Therefore it uses the NetScheduleJobAdd function.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: sec.re**********.info
Port: 8085
Server password: 3v1l$
Channel: #sploit
Nickname: [00|USA|XP|%number%]


 Furthermore it has the ability to perform actions such as:
    • Execute file
     Perform network scan
    • Shut down system
     Updates itself

 Backdoor The following port is opened:

explorer.exe on TCP port 33097 in order to provide an HTTP server.

 Miscellaneous Anti debugging
It checks if one of the following files are present:
   • \\.\SICE
   • \\.\NTICE


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Thursday, February 25, 2010
Description updated by Petre Galan on Friday, February 26, 2010

Back . . . .