Home Malware Programs Backdoors Backdoor:Win32/IRCbot.GX

Backdoor:Win32/IRCbot.GX

Posted: October 16, 2012

Threat Metric

Ranking: 8,969
Threat Level: 2/10
Infected PCs: 1,712
First Seen: October 16, 2012
Last Seen: September 27, 2023
OS(es) Affected: Windows

Backdoor:Win32/IRCbot.GX is a backdoor Trojan that propagates via removable drives. Backdoor:Win32/IRCbot.GX allows attackers to gain unauthorized access and control of an infected computer via IRC. Backdoor:Win32/IRCbot.GX logs keystrokes and steals personal information from victims. Once installed, Backdoor:Win32/IRCbot.GX copies itself to the ceratin locations of the corrupted computer system. Backdoor:Win32/IRCbot.GX downloads and executes potentially malicious files and modifies the Windows Registry by adding registry entries. Backdoor:Win32/IRCbot.GX injects a malicious code into several legitimate running processes including notepad.exe, charmap.exe and explorer.exe in order to avoid detection and removal of anti-virus software. Backdoor:Win32/IRCbot.GX may also set an autorun.inf file in the root directory of the affected drive, which contains execution instructions for the operating system, so that when the removable drive is accessed from another PC, which supports the Autorun feature, Backdoor:Win32/IRCbot.GX is run automatically.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Documents and Settings\<username>\application data\iygdzez\iygdzez.exe File name: C:\Documents and Settings\<username>\application data\iygdzez\iygdzez.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Documents and Settings\<username>\local settings\temp\iygdzez.exe File name: C:\Documents and Settings\<username>\local settings\temp\iygdzez.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
<targeted drive>:\showfiles.exe File name: <targeted drive>:\showfiles.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
<targeted drive>:\..lnk File name: <targeted drive>:\..lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
<targeted drive>:\subst.lnk File name: <targeted drive>:\subst.lnk
Mime Type: unknown/lnk
Group: Malware file
autorun.inf File name: autorun.inf
Mime Type: unknown/inf
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List = "C:\Documents and Settings\Administrator\Application Data\IyGdZEZ\IyGdZEZ.exe" = "c:\documents and settings\administrHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List = "C:\Documents and Settings\Administrator\Application Data\IyGdZEZ\IyGdZEZ.exe"

Additional Information

The following URL's were detected:
trymsg.com
Loading...