DarkSky

$3.00

0.00004861
61,717.89 USD/BTC
0.00904076
331.83 USD/BCH
29.28209
0.1 USD/DOGE
0.0472384
63.51 USD/LTC
0.017286
173.55 USD/XMR

Botnet focused mainly on DDOS attacks (TCP (SYN) Flood, UDP Flood, HTTP Flood)

Category: Tags: ,

Description

Botnet focused mainly on DDOS attacks (TCP (SYN) Flood, UDP Flood, HTTP Flood)
Source code.

Infection Methods
Radware suspects the bot spreads via traditional means of infection such as exploit kits, spear phishing and spam emails.

Capabilities

Perform DDoS Attack:
The malware is capable of performing DDoS attacks using several vectors:
DNS Amplification
TCP (SYN) Flood
UDP Flood
HTTP Flood

Downloader:
The malware is capable of downloading malicious files from a remote server and executing the downloaded files on the infected machine. After looking at the downloaded files from several different botnets, Radware noticed cryptocurrency-related activity where some of the files are simple Monero cryptocurrency miners and others are the latest version of the “1ms0rry” malware associated with downloading miners and cryptocurrencies.

Proxy
The malware can turn the infected machine to a SOCKS/HTTP proxy to route traffic through the infected machine to a remote server.

Malware Behavior

The malware has a quick and silent installation with almost no changes on the infected machine. To ensure persistence on the infected machine it will either create a new key under the registry path “RunOnce” or create a new service on the system:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\Registry Driver
HKLM\System\CurrentControlSet\Services\Icon Codec Service\

Communication
When the malware executes, it will generate an HTTP GET request to “/activation.php?key=” with a unique User-Agent string “2zAz.” The server will then respond with a “Fake 404 Not Found” message if there are no commands to execute on the infected machine.

Communication Obfuscation Example
The GET request param value is base64 encrypted.
The final readable string contains infected machine information as well as user information. When a new command is sent from the server “200 OK,” a response return is executed with the request to download a file from the server or execute a DDoS attack

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.