I think I've seen this one before. Some keywords that come to mind are APRE (Advanced Port Redirection Engine), Assassin 2.0, and the site that hosts those files (forget the name). These guys code Trojans for $$$!!! But they also offer free tools to make Trojans and it looks like this one is using those tools by what you described (especially when attaching to IE process, which is its default option to bypass Application Protection!!!). The app protection would catch it if it were utilizing MD5 versus file names (dumb)...
APRE tool: http://www.megasecurity.org/trojans/a/apre/Apre1.0.html Trojans for $$$ website: ????? Kris Hermansen -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jarkko Turkulainen Sent: Sunday, November 23, 2003 9:32 AM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] New backdoor program in the wild I just found a new backdoor program in the wild. It is a reverse backdoor that uses udp port 53 to communicate with the server side. It uses a couple of interesting techniques, for example, it injects itself in hidden IE instance. I wrote a little paper about the analysis: http://www.klake.org/~jt/malware/spotcom/ Regards, -- Jarkko Turkulainen <[EMAIL PROTECTED]> _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
