Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/Agent.339968
Date discovered:16/07/2010
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:339.968 Bytes
MD5 checksum:b546fcf1db522e065046c2fd8ff95bd6
IVDF version:7.10.09.105 - Friday, July 16, 2010

 General Aliases:
   •  Bitdefender: Trojan.Generic.4176756
   •  Panda: Trj/Spy.TJU
   •  Eset: Win32/Spatet.I


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a malicious file
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following location:
   • %SYSDIR%\Windows Explorer\csrss.exe



It deletes the following file:
   • %TEMPDIR%\XX--XX--XX.txt



The following files are created:

%TEMPDIR%\XX--XX--XX.txt
%TEMPDIR%\UuU.uUu
%TEMPDIR%\XxX.xXx
– %HOME%\Application Data\logs.dat



It tries to download a file:

– The location is the following:
   • http://freespeed.org/**********




It tries to execute the following file:

– Filename:
   • "%SYSDIR%\Windows Explorer\csrss.exe"

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
   Run]
   • "Windows Explorer"="%SYSDIR%\Windows Explorer\csrss.exe"

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Explorer 64"="%SYSDIR%\Windows Explorer\csrss.exe"

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Explorer x86"="%SYSDIR%\Windows Explorer\csrss.exe"

– [HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
   Run]
   • "Windows Explorer"="%SYSDIR%\Windows Explorer\csrss.exe"



The following registry keys are added:

– [HKLM\Software\Microsoft\Active Setup\Installed Components\
   {I63I1187-MI57-Q313-WR01-GP8AVJ8II48T}]
   • "StubPath"="%SYSDIR%\Windows Explorer\csrss.exe"

– [HKCU\SOFTWARE\2603]
   • "FirstExecution"="%current date%"
   • "NewIdentification"="2603"

 Backdoor The following port is opened:

– 260320101406.no-**********.biz on TCP port 4688

 Injection – It injects itself as a remote thread into a process.

    Process name:
   • explorer.exe


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Wednesday, October 6, 2010
Description updated by Petre Galan on Wednesday, October 6, 2010

Back . . . .