BKDR_DAGGER.140

Malware type: Backdoor

Aliases: Backdoor.Win32.Dagger.140 (Kaspersky), Generic.ca (McAfee),

In the wild: No

Destructive: Yes

Language: English

Platform: Windows

Encrypted: No

Overall risk rating:

Description: 
This client program of a backdoor malware executes commands on a remote computer infected with the server program. This program enables a remote hacker to have full access to the files on the system where the backdoor server program is installed.

For additional information about this threat, see:

Description created: Aug. 15, 2001 1:59:29 PM GMT -0800
Description updated: Mar. 26, 2002 1:56:31 AM GMT -0800


TECHNICAL DETAILS


Size of malware: Server=451,584 Bytes
Client=629,248 Bytes

Initial samples received on: Jun 3, 2001

Related toBKDR_DAGGER.131

Payload 1: (It compromises network security)

Trigger condition 1: Upon execution

Details:
This client program of a backdoor malware, written in Delphi connects to the computer infected with server program via a fixed port 2589. The hacker using this client program can execute any or all of the following on the computer infected with the server program:

  • Get System Information
  • Send pop up messages
  • Act as a mini file browser (this includes read and write access to the files of the server.)
  • Execute Files
  • Process Tool
  • Shutdown/Reboot/NetLogon the system
  • Enable/Disable Desktop
  • Enable/Disable Running Applications
  • Enable/Disable Closing Windows
  • Power off option for ATX systems
  • Turn On/Off Num/Caps/Scroll lock lamps
  • Set Mouse Location
  • Show/Hide Taskbar
  • Eject/Close CD Rom Drive
  • Turn Power Saving On/Off
  • Enable/Disable CTRL-ALT-DEL key combo
  • Get screen resolution
  • Determine location of Windows directories
  • Set the server password
  • Have a chat with the server
  • Print something on the server printer

An additional feature for this backdoor is its ability to have notification via ICQ. All the client component needs is the UIN.

When the server component of this backdoor malware is executed, it copies itself to a MANAGER.EXE file in the Windows System directory. It then creates a registry entry as follows so that it executes upon Windows startup:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
"SysManager" "C:\Windows\System\Manager.EXE"

Thereafter, it stays resident in memory as a service process so that it is not seen in the Task Manager when the infected user presses the Ctrl-Alt-Delete keys. The server component then listens and sends data via port 1386 to the hacker running the client program.

The client program requires the Internet Protocol (IP) address of the target computer.


SOLUTION


Minimum scan engine version needed: 5.200

Pattern file needed: 0.897.00

Pattern release date: Jun 6, 2001


Important note: The "Minimum scan engine" refers to the earliest Trend Micro scan engine version guaranteed to detect this threat. However, Trend Micro strongly recommends that you update to the latest version in order to get comprehensive protection. Download the latest scan engine here.

Solution:

  1. Click Start>Run, type REGEDIT.EXE then hit the ENTER key.
  2. In the left panel, double click the following:
    HKEY_LOCAL_MACHINE>Software>Microsoft>Windows
    >CurrentVersion>Run
  3. In the right panel, look for this registry value and then delete it:
    "SysManager"
  4. Close the Registry.
  5. Restart your system.
  6. Click Start>Run, type EXPLORER C:\Windows\System then hit the Enter key.
  7. Look for and then delete the MANAGER.EXE file.
  8. Scan your system with Trend Micro antivirus and delete all files detected as BKDR_DAGGER.140. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner.



Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business, mobile device or home PC.