lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: khermansen at (Kristian Hermansen)
Subject: New backdoor program in the wild

I think I've seen this one before.  Some keywords that come to mind are APRE
(Advanced Port Redirection Engine), Assassin 2.0, and the site that hosts
those files (forget the name).  These guys code Trojans for $$$!!!  But they
also offer free tools to make Trojans and it looks like this one is using
those tools by what you described (especially when attaching to IE process,
which is its default option to bypass Application Protection!!!).  The app
protection would catch it if it were utilizing MD5 versus file names

APRE tool:
Trojans for $$$ website: ?????

Kris Hermansen

-----Original Message-----
[] On Behalf Of Jarkko
Sent: Sunday, November 23, 2003 9:32 AM
Subject: [Full-Disclosure] New backdoor program in the wild

I just found a new backdoor program in the wild. It is a reverse backdoor
that uses udp port 53 to communicate with the server side. It uses a
couple of interesting techniques, for example, it injects itself in hidden
IE instance.

I wrote a little paper about the analysis:


Jarkko Turkulainen <>

Full-Disclosure - We believe in it.

Powered by blists - more mailing lists