FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

New BackDoor.Butirat generates names of control servers

January 24, 2013

Russian anti-virus company Doctor Web is warning users that a new backdoor has been found in large numbers in the wild. Dubbed BackDoor.Butirat.245, the program features a new routine to generate names of control servers to connect to. The most probable rationale behind this feature is to keep the malware operational as long as possible even if one of its controlling servers is shut down.

Recall that malware in the BackDoor.Butirat family can download and launch executables in an infected system after receiving an appropriate command from a control server and steal passwords stored by popular FTP-clients (FlashFXP, Total Commander, Filezilla, FAR, WinSCP, FtpCommander, SmartFTP and others).

screen

Yet such backdoors use a rather common infection mechanism: they replicate themselves to a system folder and modify the registry so that the copy is launched automatically whenever Windows is loaded.

The distinguishing feature of BackDoor.Butirat.245 is a brand new routine to generate control server names. Earlier versions in the malware family had server names hardcoded. As was the case with the recently discovered version of BackDoor.BlackEnergy; Doctor Web's analysts, who examined BackDoor.Butirat.245, were in for a surprise: the program automatically generated third-level domain names. A respective second-level domain name turned out to be registered by a company that traditionally ignores any requests and complaints. Apparently, virus makers supposed that they could in this way increase the malicious program's persistence if one of their control servers is shut down.

The threat's signature has been added to Dr.Web virus databases, so BackDoor.Butirat.245 poses no threat to computers protected by Doctor Web anti-viruses.

Tell us what you think

To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

Российский разработчик антивирусов Dr.Web с 1992 года
Dr.Web в Реестре Отечественного ПО
Dr.Web совместим с российскими ОС и оборудованием
Dr.Web пользуются в 200+ странах мира
Техническая поддержка 24х7х365 Рус | En

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a Russian cybersecurity company focused on threat detection, prevention and response technologies.