[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <03Nov23.141057-0500_est.216571-29674+39367@ams.ftl.affinity.com>
From: khermansen at ht-technology.com (Kristian Hermansen)
Subject: New backdoor program in the wild
I think I've seen this one before. Some keywords that come to mind are APRE
(Advanced Port Redirection Engine), Assassin 2.0, and the site that hosts
those files (forget the name). These guys code Trojans for $$$!!! But they
also offer free tools to make Trojans and it looks like this one is using
those tools by what you described (especially when attaching to IE process,
which is its default option to bypass Application Protection!!!). The app
protection would catch it if it were utilizing MD5 versus file names
(dumb)...
APRE tool: http://www.megasecurity.org/trojans/a/apre/Apre1.0.html
Trojans for $$$ website: ?????
Kris Hermansen
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Jarkko
Turkulainen
Sent: Sunday, November 23, 2003 9:32 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] New backdoor program in the wild
I just found a new backdoor program in the wild. It is a reverse backdoor
that uses udp port 53 to communicate with the server side. It uses a
couple of interesting techniques, for example, it injects itself in hidden
IE instance.
I wrote a little paper about the analysis:
http://www.klake.org/~jt/malware/spotcom/
Regards,
--
Jarkko Turkulainen <jt@...ke.org>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists