This memory-resident Trojan acts as an Internet Relay Chat (IRC)
client fileserver and broadcasts itself in the IRC channel irc.dal.net.
It enables a remote user access to an infected user's computer files
via connection to port 46666.

TROJ_TASMER.B

Details:
Upon execution, this Trojan creates the following registry entry in the
Windows System directory so that it executes at every system
startup:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\RunTaskManager=“%winsysdir%\tskmngr .exe”

It drops a copy of itself as TSKMNGR.EXE in the windows system
directory and then exits. Thereafter, every time the computer is
started, TSKMNGR.EXE executes and runs in the background as a
process. It listens to Transmission Control Protocol (TCP) port
46666 and broadcasts itself in the IRC channel irc.dal.net. Once
active, it acts as an IRC client fileserver that any remote user with
the client program can connect to and access.

The Trojan's body contains the following text strings:

tskmngr.exe
Task Manager
ftp -s:c:\flog
%s, %s : USERID : UNIX : %s%c%c
PRIVMSG %s :ctcp <nick> PING 848348, help, getnick
<nick>, getnonick, rnick <nick>!!, sacker time
low_port
high_port addy, jacker time ip ip ip etc, stopsack,

stopjack, spawn filename, ftpget EVERYTHING,
randnick,
clone, clonedie
TROJ_TASMER.B
Aliases:
TROJAN_TASMER.B, TASMER.B,
Backdoor-DV, Backdoor.Tasmer.b,
W32/Tasmer.46395,
W95/Backdoor.Tasmer.B, Troj/Narnar.B
by shanker0987654321 September 20, 2009

5 Words Related to TROJ_TASMER.B

Free Daily Email

Type your email address below to get our free Urban Word of the Day every morning!

Emails are sent from daily@urbandictionary.com. We'll never spam you.

×