Lavasoft Security Bulletin - February 2014: Bot Review
Bot Review
Table: Bots under analysis (February 2014, Lavasoft MAS).
Bot's name | Jan 2014 | Feb 2014 | Changes |
Zbot | 259 | 197 | -9.8% |
Cycbot | 17 | 41 | 3.8% |
Kelihos | 193 | 146 | -7.4% |
NrgBot/Dorkbot | 145 | 233 | 13.9% |
Blazebot | 1 | 15 | 2.2% |
Shiz | 5 | 3 | -0.3% |
Total | 620 | 635 |
Bot distribution in February:
Kelihos
Kelihos continues to download new versions of itself, now using the following url mask:
http://[IP Address]/mod[id]/[file name].exe
For example:
hxxp://77.122.80.243/mod2/keybex1.exe
hxxp://178.150.171.207/mod1/keybex1.exe
You can find the latest description on Kelihos here.
Cycbot. Shows no sign of disappearing soon. You can find the latest description on Cycbot here.
Shiz. The backdoor is still alive despite decreased number of occurrences. The latest example is here.
The list of domains Shiz connects to:
URL | IP |
---|---|
hxxp://digivehusyd.eu/login.php | ![]() |
hxxp://gadufiwabim.eu/login.php | ![]() |
hxxp://kefuwidijyp.eu/login.php (ET CNC Zeus/Spyeye/Palevo Tracker Reported CnC Server (group 3) , Malicious) | ![]() |
hxxp://vofozymufok.eu/login.php | ![]() |
jefapexytar.eu | ![]() |
fokyxazolar.eu | ![]() |
xuqohyxeqak.eu | ![]() |
cihunemyror.eu | ![]() |
lyruxyxaxaw.eu | ![]() |
www.bing.com | ![]() |
foxivusozuc.eu | ![]() |
ryqecolijet.eu | ![]() |
puregivytoh.eu | ![]() |
gahihezenal.eu | ![]() |
qegytuvufoq.eu | ![]() |
vojacikigep.eu | ![]() |
makagucyraj.eu | ![]() |
tucyguqaciq.eu | ![]() |
nozoxucavaq.eu | ![]() |
puvopalywet.eu | ![]() |
ciliqikytec.eu | ![]() |
tunujolavez.eu | ![]() |
xutekidywyp.eu | ![]() |
dikoniwudim.eu | ![]() |
divywysigud.eu | ![]() |
lyvejujolec.eu | ![]() |
puzutuqeqij.eu | ![]() |
fobonobaxog.eu | ![]() |
rydinivoloh.eu | ![]() |
lysovidacyx.eu | ![]() |
qeqinuqypoq.eu | ![]() |
magofetequb.eu | ![]() |
tupazivenom.eu | ![]() |
rytuvepokuv.eu | ![]() |
qetoqolusex.eu | ![]() |
masisokemep.eu | ![]() |
gatedyhavyd.eu | ![]() |
fodakyhijyv.eu | ![]() |
cicaratupig.eu | ![]() |
vocumucokaj.eu | ![]() |
nofyjikoxex.eu | ![]() |
tuwikypabud.eu | ![]() |
kepymexihak.eu | ![]() |
xuxusujenes.eu | ![]() |
lymylorozig.eu | ![]() |
jepororyrih.eu | ![]() |
xubifaremin.eu | ![]() |
dimutobihom.eu | ![]() |
voniqofolyt.eu | ![]() |
fogeliwokih.eu | ![]() |
dixemazufel.eu | ![]() |
qederepuduf.eu | ![]() |
kemocujufys.eu | ![]() |
nojuletacuf.eu | ![]() |
rynazuqihoj.eu | ![]() |
marytymenok.eu | ![]() |
jejedudupuc.eu | ![]() |
volebatijub.eu | ![]() |
ciqydofudyx.eu | ![]() |
cinepycusaw.eu | ![]() |
keraborigin.eu | ![]() |
pumadypyruv.eu | ![]() |
nopegymozow.eu | ![]() |
galokusemus.eu | ![]() |
jewuqyjywyv.eu | ![]() |
Zbot. We counted 197 backdoors this month, 94 of them install a Tor client to communicate with the C&C. server. You can find the latest description on Zbot here
NrgBot/Dorkbot. The latest description is here.
Rbot. The latest description is available in Malware Encyclopedia.
Read the part 1: Lavasoft Security Bulletin - February 2014: Under the Dropbox Umbrella.
Share this post:

