Backdoor.PHP.C99Shell.w

Backdoor.PHP.C99Shell.w




Detection added Sep 12 2007 10:29 GMT
Description added Aug 04 2008
Behavior Backdoor
  • Technical details
  • Payload
  • Removal instructions
Technical details
This Trojan provides a remote malicious user with access to the victim machine. It is a PHP script. It is 229051 bytes in size.

Installation

This backdoor can be installed on a web server by a remote malicious user by uploading it via FTP, using the administrator's log-in details which have already been stolen. It can also be used to exploit a range of web site vulnerabilities which make it possible to upload a random file to the directory which contains the site scripts. Once this has been done, a hidden page appears on the site. Opening this page makes it possible for the malicious user to launch the backdoor and make use of its malicious functionality.

Payload
This backdoor is designed to provide remote, unauthorised administration of web servers. When the backdoor is launched, the malicious user is shown the backdoor interface:

The backdoor is able to conduct the following actions on the remote server:

  1. provide full access to files on the hard disk
  2. Calculate a range of hashes for strings
  3. launch the command interpreter and bind its standard input/ output to a specific TCP port
  4. bind the standard input/ output of the command interpreter to data from the IRC server (datapipe)
  5. view a list of processes launched on the server
  6. execute random PHP code
  7. download/ upload files from/to the server
  8. search the server's hard disk for files with specific content
  9. manage mysql databases (view/ create/ edit databases/tables)
  10. run shell commands
  11. scan FTP server accounts for weak passwords (e.g. where the account name and password co-incide)
  12. delete the copy of itself from the server hard disk on command
  13. create a user account without password
  14. view active users in the system
  15. delete records of its own activity from Apache server logs
  16. exploit a range of Linux kernel and bash command interpreter vulnerabilies
  17. run via the proxy server shown below
    http://*****faced.org/proxy/index.php?q=
hiding the address of the remote malicious user.

Removal instructions
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Delete the original backdoor file (the location will depend on how the program originally penetrated the victim machine).
  2. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).