Home Schools Links Virus List Add a School Change a Link Dead Link
Link to us Financial Aid Free E-mail Guestbook Cool Links Tell A Friend
NextCard Visa If your School has a Schools Alumni Page let us know Solve your computer needs at eBay


DonaldD.Trojan

 
Tell A Friend
about this
Page
Tell me when
this page
is updated
Link to us
Our Sponsor

DonaldD.Trojan is something similar to BackOrifice.Trojan. When installed on a Microsoft Windows system, this backdoor trojan horse program allows others to gain full access to the system through a network connection. It consists of two pieces: a server and a client application. Both applications are capable of running under Windows 95, 98, and NT 4.0.

The port number through which the client controls the server is configurable. However, as long as the port is blocked by a firewall, this trojan horse will not be able to infiltrate the server. It does not matter whether the TCP or SPX protocol is implemented. There have not been any reports of this program being able to break through a firewall.

Server application may be configured with different options.

The networking protocol may be TCP or SPX. Any port number between 1 and 65535 may be selected for communication. The default port number for TCP is 23476, and an additional default port is 23477. For SPX, it is 0x9014 and an additional default port is 0x9015.

A password may be specified to limit the access on a server. However, there is a bug with version 1.52 of the trojan. In the client GUI, the password typed in is initially hashed using MD5 and is converted to a 32-byte string which is the hex representation. Then the result is sent to the server. For the command-line version of the client, the password is sent without using any type of encryption. Thus, if a user sets the password of the server using the command-line client, he cannot re-access it by using the GUI client with the same password.

Here are some of the bugs found in version 1.52 of this trojan. When the client attempts to play a WAV file to the server, and the client does not specify a filename in this field, the client program will crash. The same situation occurs when the client user forgets to specify the pathname for the server upgrade command.

Commands the program may send to the server program:

Create and delete directories
Copy, delete, rename, upload and download files
View, terminate, set priorities for processes
Suspend and resume threads
Execute programs
Create and delete registry keys
Set registry values
Modify system date and time
Perform a shutdown, log-off, restart, and power-off
Obtain a list of windows opened
Get a snapshot of the whole screen or just for a specific window
Send messages to a specific window
Modify CMOS (however, this only works in Windows 95/98 for now)
Look at the contents of the buffer where the keyboard input is stored
Re-map and disable keys off the keyboard
Simulate certain keystrokes (only works in Windows 95/98)
Open and close the CD-ROM tray
Turn the monitor on and off
Send message boxes with a few sets of buttons to choose from
Play wave (WAV) files
Chat with other people
Obtain CMOS and screensaver passwords
Query a list of shared resources

TIPS
Reboot the machine to a clean DOS boot or Windows Startup floppy disk.
Go to the \WINDOWS\SYSTEM directory on the drive where Windows is installed.
Delete the file an antivirus product detected as the DonaldD.Trojan. Remove the floppy disk and restart the system.
Edit the Windows registry using REGEDIT.EXE. Go to the following registry key:

HKEY_LOCAL_MACHINE\System\
CurrentControlSet\
Services\VxD\

Delete the folder named VMLDR.

Go to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Control\
Session Manager

On the right-side of the window, look for the registry with BootExecute inside its Name field. Right-click on BootExecute, select Modify. Here, you will see some hexadecimal numbers and some ASCII text beside them. Look for bootexec.
To its left where all the hexadecimal numbers are, you'll see the following numbers: 00 62 6F 6F 74 65 78 65 63.
Highlight these numbers, and press the backspace key to erase them. Make sure that you erase NO MORE or NO LESS of these numbers.
Click Ok.
Scroll down the window, and you will find two registry keys with Pdata0 and Pdata1 as their name fields.
They are just next to each other. Right-click on each of them,then select Delete.
This should delete the registry keys from all ControlSet registry keys (i.e., ControlSet01, ControlSet02, etc.).
Then, restart the system. Once Windows has started, go into the Command Prompt in the Start/Programs... menu, and delete the file an antivirus product detected as the DonaldD.Trojan.
Check the registry again to make sure the trojan did not reinstall itself.

Windows 9x Systems without an antivirus product Installed

If you do not have an antivirus product that detects this trojan, you must do the following.
Reboot the system to a clean DOS boot or Windows Startup floppy disk. Go to the \WINDOWS\SYSTEM directory on the drive where Windows is installed.
Delete the following files:
PNPMGR.PCI,
OLEPROC.EXE,
VMLDR.VXD.

Remove the floppy disk and restart the system.
Go to the following Windows registry key:

HKEY_LOCAL_MACHINE\System\
CurrentControlSet\Services\VxD\

Delete the folder named VMLDR.

Restart the machine again, look at the registry, and make sure that the trojan did not re-install itself.

 


 

[an error occurred while processing this directive]

Gator fills out forms and remembers passwords!


Howdy!!!
Welcome to the McCann's PooR Farm
I'm not with any school or schools,
Just a disable grandpa with 17 grand kids, 1 Great grand Kid
 
Sorry! about all of the adds, Our Cost just keeping going up.
Please click on one of them and help us out. or
Send $1.00 U.S. to:
McCann's Poor Farm
20509 Lawrence 2207
Aurora, Mo. 65605-7275
Thank You,
Junior McCann
Webmaster
and the GrandKids
 
See what the experts have to say about the McCann's Poor Farm Web Page
 
Legal Disclaimer - We Are in no way connected with any School and or Companies linked to this page. Links are provided as a courtesy only.

Where Visitors Come From:

Argentina, Australia, Austria, Belarus, Belgium, Bermuda, Brazil, Brunei Darussalam, Bulgaria, Canada, Chile, Columbia, Costa Rica, Croatia, Croatia/Hrvatska, Czech Republic, Denmark, Dominican Republic, Ecuador, Egypt, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Jordan, Korea, Korea, Republic of, Latvia, Lebanon, Lithuania, Luxembourg, Macedonia, Malaysia, Mexico, Moldova, Netherlands, New Calendonia, New Zealand, Norway, Old style Arpanet, Papua New Guinea, Peru, Philippines, Poland, Portugal, Romania, Russian Federation, Saudi Arabia, Singapore, Slovakia, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, USA Government, USA Military, Viet Nam
Tell A Friend
about this Page
Tell me when this page
is updated

Click Here!


Home Schools Links Virus List Add a School Change a Link Dead Link
Scholarships Financial Aid Free E-mail Guestbook Cool Links Tell A Friend
Put a Link on your Web Page

- Legal Disclaimer -
This Website Is For Your Entertainment Purposes Only!
We Are in no way connected with
any School and or Companies linked to this page.
Links are provided as a courtesy only.
 
http://www.poor-farm.com/
webmaster@poor-farm.com
McCann's PooR Farm
Aurora, Mo. 65605
© 2001