Surila (b)
(Backdoor.Win32.Surila.b)

by ?

Written in Microsoft Visual C++, compressed with UPX

Origin: China

more versions


size: 57,344 bytes

port: 33440 TCP

added to registry:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Enum
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\l
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Security

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "mutexname"
data: kSOSVXJ

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "sockport"
data: 33440 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "spoofurl" 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "devsec"
data: C:\WINDOWS\tcp32ss.exe 
	
c:\windows\win.ini, [windows] "load"
value: tcp32ss.exe 

tested on Windows XP
April 17, 2005

MegaSecurity