Post

Backdoor DLL

Backdoor DLL

Executive Summary

Backdoor.dll sets up a reverse shell that connects to a remote server, listens for incoming commands, and executes them on the infected machine. It uses standard Windows networking APIs (Winsock) and process creation functions to facilitate the remote execution of arbitrary commands. This type of behavior is typical of a backdoor or remote access Trojan (RAT).


Case Details

Sample Information

AttributeValue
File namebackdoor.dll
File size160 KB
File typeApplication Extension (DLL)
MD5290934c61de9176ad682ffdd65f0a669
SHA1a4b35de71ca20fe776dc72d12fb2886736f43c22
SHA256f50e42c8dfaab649bde0398867e930b86c2a599e8db83b8260393082268f2dba
Packer / compiler infodynamic-link-library
Compile timeSun Dec 19 16:16:38 2010 (UTC)

Case-Specific Requirements

Environment

  • Operating System: Windows

Tools Used

  • IDA

Static Analysis

Using IDA to load the DLL.

img

The malware checks for a mutex to ensure that only one instance of the malware runs at a time.

img

If the mutex is not found, it creates it using CreateMutexA. The name of the mutex is “SADFHUHF”.

img

The malware connects to the remote server using the socket() function and establishes a connection with connect().

img

The IP address is 127.26.152.13, while the port is not assigned. The default port is 80.

img

The malware terminates when it receives the command q from the remote server. This command prompts the program to close the connection and exit.

img

When the sleep(60000) command is received, the malware will sleep for 60000 milliseconds, which is equivalent to 6.55 minutes.

img

The prefix string exec causes the malware to execute arbitrary commands on the infected machine. When the malware receives a command starting with exec, it uses CreateProcessA to run the specified command on the system.


IOCs

IOCType
127.26.152.13:80IP:PORT

Additional Notes

  • What is the name of the mutex used by the malware?
    • SADFHUHF
  • What is the IP address and port the malware connects to?
    • 127.26.152.13:80
  • What is the command that causes the malware to terminate?
    • q
  • What is the command that causes the malware to sleep, and how many minutes will it sleep?
    • Sleep:60000 | sleep:6.55min
  • What is the prefix string causing the malware to be able to execute arbitrary command line?
    • exec
This post is licensed under CC BY 4.0 by the author.