NetTrojan
(Backdoor.Win32.NetTrojan)

by ?

Written in Visual Basic




size: 453.632 bytes

text string in binary: "Dynamic Trojan Horse Network"

According to ISS X-Force:
" DTHN propagates through email and
through open NetBIOS file shares. DTHN installs itself and establishes
communication to a sophisticated peer-to-peer communications network,
to further spread infections and launch additional attacks.

Impact: 

As with most network worms, DTHN propagation can cause network
congestion, automatically compromise victim systems, and configure a
sophisticated network that can be used for Distributed Denial of
Service (DDOS). Once the backdoor is installed, it can be accessed
by the author, or third party attackers.

Description: 

The DTHN worm reportedly originated in Germany in October 2002.
Propagation in the wild was only detected on December 19, 2002. 

DTHN has the following capabilities: 

-Mass emailing component 
-DDOS component 
-NetBIOS file share scanning component
-IRC flooding component 
-Port redirection 
-Port scanning 
-Secure P2P communications network 

DTHN is a new class of Trojan that includes a data driven
configuration, sophisticated P2P communications, and a modular
architecture. Once installed on a system, DTHN scans Internet Relay
Chat (IRC) servers that are hard-coded in the DTHN configuration
script. The DTHN Trojan captured by X-Force communicates over multiple
IRC networks, yet does not join IRC channels like many IRC capable
Trojan horse programs of the past. This behavior makes it more
difficult to detect the size and scope the DTHN network. DTHN uses a
large list of IRC nicknames with an additional character prefix and
suffix defined by the configuration file. Each DTHN Trojan is
assigned a static username parameter which is defined in the
configuration file. This is used by the network to perform peer
discovery.

While scanning for and connecting to an IRC server, DTHN actively
scans for open NetBIOS shares on a network and then attempts to
propagate by copying instances of itself to writable shares. DTHN
establishes an additional peer-to-peer network of infected systems
using high TCP ports. The peer-to-peer network forwards authenticated
messages between the infected systems from the "master" user. DTHN has
a distributed update mechanism that allows the master to modify the
configuration file to change the behavior of individual Trojan horse
installations, or that of the entire network. DTHN modules can also
be pushed to the network to add new capabilities such as, mass-email,
DDoS, NetBIOS scanning, IRC flooding, port redirection, and port
scanning. DTHN uses MD5 hashes to authenticate the master user to
the DTHN machines." 

MegaSecurity