Backdoor.Win32.BO or Trojan.Win32.BO or Back Orifice is a trojan/backdoor that runs on Win32 Operating Systems.
This trojan (also known as Back Orifice trojan) is a network-administration utility that allows for the controlling of computers on the network. 'Back Orifice' is a remote administration system, which allows a user to control a computer across a tcpip connection using a simple console or GUI application. On a local line or across the internet, Back Orifice gives its user more control of the remote Windows machine than the person at the keyboard of the remote machine has," reads the advertising banner on a distribution Web-site.
The only feature classifying this utility as malicious trojan software is the silent installation and execution. When this program is run, it installs itself into the system and then monitors it without any requests or messages. If you already have it installed on your computer, you cannot find this application in the task list. The trojan also does not indicate its activity in any way.
The trojan is distributed in a package of several programs and documentations. All programs in a package were written in C++ and compiled by Microsoft Visual C++ compiler. The date stamp on the .exe files that we have displays that all files in the package were compiled from the end of July through the first week of August 1998. All the programs in the package have Portable Executable formats and can be run under Win32 only.
The main executable in a package is the BOSERVE.exe file that might be found with different names on an infected computer. This is the trojan itself. It is the "server" part of the trojan that might be summoned by clients from a remote computer.
The second file is the BOCONFIG.exe utility that can configure the server as well as attach it to other executable files in the same style as viruses do. While attaching (infecting), the host file is moved down and the trojan code is placed at the top of file. When "infected" files are run, the trojan extracts the original file image and spawns it without any side effects.
There are two "client" parts of the trojan (console and window), and they operate with the "server" from a remote computer. Two other executable files in a package are used by the trojan while compressing/decompressing files on the "server".
When the trojan is executed on the computer, it first of all detects its status: is it the original trojan code or attached to some host file, i.e., modified by the BOCONFIG.exe utility. In this case, the trojan locates the customized options in the host file and reads them.
The trojan then initializes the Windows sockets, creates the WINDLL.dll file in the Windows system directory (this file is stored as a resource in the trojan), then obtains several KERNEL32.dll APIs addresses for future needs, searches for a trojan process already run and terminates it (which upgrades the trojan process), copies itself to the Windows system directory and registers this copy in the system registry as the auto-run service:
Creates a TCP/IP datagram socket, assigns a port number 31337 (by default) to this socket and opens this port for listening. The trojan then runs standard Windows DispatchMessage loop, i.e., stays in Windows memory as a process with a hidden attribute (it has no active window and is not visible in task manager).
The main trojan routine then listens for commands from the remote client. The commands travel in encrypted form and start with the "*!*QWTY?" (without " characters) ID-string.
Depending on the command, the trojan is able to perform a set of actions:
- Obtain and send computer name, user name and system info: processor type, memory size, Windows OS version, installed drives and free space on them;
- Share selected drives;
- List disk contents or search for a specific file;
- Send/receive files (read and write them), as well as delete, copy, rename and run them (including updating itself);
- Create/delete directories;
- Compress/decompress files;
- Log off current user;
- Halt the computer;
- Enumerate and send active processes;
- Enumerate and connect to network resources;
- Terminate selected process;
- Obtain and send cashed passwords (passwords that were used during current session), then look for the ScreenSaver password (decrypt and send them);
- Display message boxes;
- Access the system registry;
- Open and redirect other TCP/IP sockets;
- Support HTTP protocols and emulate the Web-server, so one may access the trojan by Web browser;
- Play sound files;
- Hook, store and send keyboard input while the user is logging in (see below).
While installing into the system, the trojan creates the WINDLL.dll file (it keeps this file image in its resources). In case of need, the trojan loads this .dll into the memory and initializes it, the DLL then hooks the keyboard and console (device console) input and stores the hooked data to the BOFILEMAPPINGKEY and BOFILEMAPPINGCON files that are then available for the main trojan routine.
The trojan can also expand its abilities by using plug-ins. They can be sent to the "server" and installed as the trojan's plug-in. The features and main functions (including possible malicious ones) are at its author's discretion.
No videos available.Cor