Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

BackDoor.SpyBotNET.79

Added to the Dr.Web virus database: 2023-10-19

Virus description added:

SHA1 hash:

  • c402d069a92bbc552c3ac6497547e10f45aca4f3

Description

A trojan spyware app written in C# and designed for computers running Microsoft Windows operating systems. It eavesdrops on users through the microphones it is able to access on infected devices, and, when it detects conversations, starts recording audio data to special files.

Operating routine

Initialization

Upon initialization, the trojan loads its settings from the configuration file and creates a working directory with the name specified in this configuration. This directory will be further used to write the malware’s files into it.

Logging actions

The trojan logs all the audio input devices (microphones) detected in a system, saving information about them to the cl.bindb file. In this file, the first line indicates the build version of the malicious app. This is followed by a list of detected devices that consists of data strings in the format of Device <index>: <name>, <channels_count> channels, where:

  • <index> is the device number in the list;
  • <name> is the device name;
  • <channels_count> is the number of audio channels.

An example of the recorded data:

1.3.3.0
Device 0: Microphone (USB PnP Audio Device), 2 channels
Device 1: Microphone (Realtek High Definiti, 2 channels

The malicious program constantly listens in on the environment through the microphone, recording a data block containing the sound information to RAM. The average value of the resulting bytes in the block is placed into the wd.bindb file. For example:

-67,2602653517369

The db.bindb file stores the history of the rounded average values of the recorded bytes from the wd.bindb file. For example:

-68 -67 -68 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -67 -68 -67 -67 -67 -67 -67 -67 -67

The resulting values of the sound intensity are compared with the target value from the configuration file, which allows the trojan to distinguish between moments of conversation and silence. Audio recordings are only made to this file when conversation occurs.

The audio recording itself is performed into a file with the <prefix><current_time><suffix_rec>, naming pattern, where:

  • <prefix> is a constant, hardcoded into the configuration;
  • <current_time> is the current time (in the yyyyMMddHHmmss format);
  • <suffix_rec> is a constant, hardcoded into the configuration.

Indicators of compromise

News about the trojan

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android