Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Turkish backdoor receives commands by analysing web-page code

June 10, 2014

Chinese speakers, as well as citizens of the former USSR countries, are often believed to be behind many of today’s malicious programs. Once a program’s code is analysed, certain conclusions can be drawn about the authorship of a threat. In this context, BackDoor.Zetbo.1, discovered by Doctor Web specialists at the end of May, is very curious. The developers of the Trojan, which can execute various commands in an infected system, appear to be from Turkey.

BackDoor.Zetbo.1 is installed into a system under the guise of the Windows Power Management service (winpwrmng) which has the following description: Allows Users to Manage the Power Options. The backdoor is saved onto the hard drive as the executable taskmgr.exe which stores all its files in %APPDATA%\Roaming\. When installed, BackDoor.Zetbo.1 displays the following message in Turkish: rundll bu dosyay? acam?yor. Dosya cok buyuk, which can be translated as "rundll cannot open this file. The file is too big".

Once started on an infected PC, the malicious service ensures that the backdoor is working; if not, it forces it to be launched. If a user tries to stop the service, the Trojan terminates Windows and displays the message “Windows had to be closed”. Windows Power Services is turned off.

screen

The main objective of this malicious program—to execute various commands from a command and control (C&C) server on an infected machine—is quite typical of backdoors. The server address is hardcoded in the bot's body, and the instructions the Trojan carries out include updating, deleting files, searching for its own components on the hard drive and shutting down the system. The backdoor can also transmit to the server various system information (e.g., the hard drive serial number). It should be noted that the malware uses a non-trivial method to acquire its operational parameters from the C&C server. BackDoor.Zetbo.1 connects to a remote host and requests a special web page featuring several buttons. By analysing the HTML code responsible for displaying these buttons, the malware defines the parameters necessary for its operation.

The signature of BackDoor.Zetbo.1 has been added to the Dr.Web virus database, so this malware poses no danger to systems protected by Doctor Web anti-virus products.

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040