Last article Table of contents Next article

Strange Article - P2P and IRC, what is the connection ? by Slage Hammer

Let me do a little bit of history, the first P2P (peer to peer) network was Napster,
and after some legal problems, almost everyone in the world, knew, even if not related to
PC stuff, what P2P software and its purpose is. Nowadays the number of P2P networks is > 30
bigger or smaller, known, or not very known, it seems this is one of the families of software
that will never die for now.

About IRC (Internet Relay Chat), to he honest I don't know the history of IRC clients
(is not my area of working) but for sure Mirc is one (maybe the one) more common in the IRC
world of users but there are other clients like Trillian and others. IRC are virtual rooms
organized trough IRC servers and channels were ppl discuss in real time about common interests.

Now getting to the topic of this article, what is the connection (in what way are related)
IRC and P2P networks ? For now does not exist any virus that is able to spread using P2P protocols
but a large number of worms exist (they are identified in AV bases as Worm.P2P.XXXXXX or similar)
that are able to spread through one or more P2P clients.

The first P2P worms were able to spread only using Kazaa client, nowaday it's common to see one
P2P worm that "supports" 8 or 10 different P2P clients. About Irc-Worms (they are identified in
AV bases as Irc-Worm; Irc.Worm and similar ways) are worms that spread mainly using Mirc , Pirc,
IRC clients.

You, poor reader of this article, you will be pissed off because for now you don't see yet where
or what the connection between IRC and P2P is, don't worry you are not stupid, I am getting to
this point, pls wait....

P2P networks were to share MP3 audio files but after some times, were used more and more
to share what is called in slang "Warez" that means Pirate software and every kind of crack,
key-gen, and what is supposed to be porn and or illegal stuff. At this point P2P worm coders
have only to write a smart names list with this kind of words as the file name of their P2P worms
and the normal user will download, and execute a crack that in real has nothing to with a crack
except the name.

IRC worms spread through DCC, that means by file transfer from one user to another. As P2P worms
were getting very common, irc worm coders discovered how to make an IRC worm / backdoor that is
able to spread through one or more P2P clients, which makes an easy job spreading fast even
because who doesn't have installed an IRC client for sure is a music or porn lover or at least
downloads something from some P2P network, so makeing an IRC worm compatible with a P2P network
is an excellent way to get it spread very fast. Just leaving connected one pc with the internet
and put some infected files into the shared folder with "interesting names".

Nowadays there are several of IRC.Backdoor or P2P.Worm (as always the name differs from one
Av company to another AV company) and several versions of many backdoor / P2P worms. For sure one
of the bigger families in this kind of malware is Spybot.Worm. To give you an idea how much
Spybot worms are common: Counting the generic detection (McAfee and KAV for example have the
generic detection), it's about 1200 / 1500 variants, maybe some 100 more.

It's right the moment that what is called IRC.Worm is a "pure" code that spreads through IRC and
what is made compatible to spread using both IRC and P2P is called IRC.Backdoor usually, but this
is AV world and as you know, names in AV world are like pussy when you don't have a woman,
something that is very hard to understand why / when and so on.

One of the first IRC backdoors is what NAV calls W32.Kwbot.Worm and Backdoor.Sdbot. Just to give
you an idea how fast the spreading of some versions of both was, AV companies discovered some
IRC channels containing more than 20K infected users in one week.

If you are interested in reading good descriptions of them, at the end of this article you will
find some links to AV descriptions.

In other words the "pure irc worms" evolved to IRC-backdoors with the abilities to spread through
P2P clients to make it faster and easier.

What is an IRC-Backdoor? Before to know this, we need to know what a backdoor is, of course.
Backdoor is a malicious program that has an automatic payload to spread plus additional abilities
that are not automatic but are performed only by request of its Master (coder).

Here is an example of the way of infecting of a normal IRC-Backdoor. Some files are put into a
shared folder of a common P2P client, one or more ppl download one of those files, thinking it is
exactly the crack, key-generator or the porn movie or porn-download they are looking for and
they execute it immediately (or later). When executed the IRC-backdoor tries to locate one or
more p2p clients and copies itself with different file names (the hard coded list some times
counts 100 or more file names) into the shared folder, registers itself in the registry
and modifies the ini (configuration files or not) of the existing IRC client, establishes a TCP
connection to a specific port of an IRC-Server and channel where the master is waiting for
connection (infected user). When the infection is succefully done, it's Master time. Now,
using his interface software, the master is able to do a long list of operations to every infected
user like upload a new version of his code, download, execute, steal information and so on.

Some links about the malwares I talked in this article:


Some Thankx goes to:

-	They guys who permitted me to publish this article.
-	Everyone who reads it (I think I will be the only one).
-	Pamela Anderson: thankx to exist, I like blond girls with big tits !!
-	Blaster Author: Hey bro, I need some money so if you decide to disclose your real
        name, pls share to me, we can make 50% and 50% of the 250k bucks offered by MS.
        (hehehe don't be offended it's just a joke)

Any comment, suggestion and stuff, send me a mail.

Thank you!