Full Disclosure mailing list archives

RE: New backdoor program in the wild


From: "Kristian Hermansen" <khermansen () ht-technology com>
Date: Sun, 23 Nov 2003 14:10:52 -0500

I think I've seen this one before.  Some keywords that come to mind are APRE
(Advanced Port Redirection Engine), Assassin 2.0, and the site that hosts
those files (forget the name).  These guys code Trojans for $$$!!!  But they
also offer free tools to make Trojans and it looks like this one is using
those tools by what you described (especially when attaching to IE process,
which is its default option to bypass Application Protection!!!).  The app
protection would catch it if it were utilizing MD5 versus file names
(dumb)...

APRE tool: http://www.megasecurity.org/trojans/a/apre/Apre1.0.html
Trojans for $$$ website: ?????


Kris Hermansen

-----Original Message-----
From: full-disclosure-admin () lists netsys com
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of Jarkko
Turkulainen
Sent: Sunday, November 23, 2003 9:32 AM
To: full-disclosure () lists netsys com
Subject: [Full-disclosure] New backdoor program in the wild


I just found a new backdoor program in the wild. It is a reverse backdoor
that uses udp port 53 to communicate with the server side. It uses a
couple of interesting techniques, for example, it injects itself in hidden
IE instance.

I wrote a little paper about the analysis:

http://www.klake.org/~jt/malware/spotcom/



Regards,

--
Jarkko Turkulainen <jt () klake org>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: