{"id":16231,"date":"2014-03-20T14:37:55","date_gmt":"2014-03-20T20:37:55","guid":{"rendered":"https://www.webroot.com/blog/?p=16231"},"modified":"2023-12-08T08:14:10","modified_gmt":"2023-12-08T15:14:10","slug":"peek-inside-modular-tor-cc-enabled-bitcoin-mining-malware-bot","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/03\/20\/peek-inside-modular-tor-cc-enabled-bitcoin-mining-malware-bot\/","title":{"rendered":"A peek inside a modular, Tor C&#038;C enabled, Bitcoin mining malware bot"},"content":{"rendered":"<p>Cybercriminals continue to maliciously &#8216;innovate&#8217;, further confirming the TTP (tactics, techniques and procedure) observations we made in our <a href=\"https://www.webroot.com/blog/2013\/12\/27\/cybercrime-trends-2013-year-review\/\"><strong>Cybercrime Trends &#8211; 2013<\/strong><\/a> assessment back in December, 2013, namely, that the diverse cybercrime ecosystem is poised for exponential growth.\u00a0Standardizing the very basics of fraudulent and malicious operations, throughout the years, cybercriminals have successfully achieved a state of &#8216;malicious economies of scale, type of <a href=\"http:\/\/www.zdnet.com\/blog\/security\/microsoft-study-debunks-profitability-of-the-underground-economy\/3522\"><strong>economically efficient model<\/strong><\/a>, successfully contributing to international widespread financial and intellectual property theft. Thanks to basic cybercrime disruption concepts, such as modular DIY (do-it-yourself)\u00a0commercial and publicly obtainable malware\/botnet generating tools. In 2014, both sophisticated and novice cybercriminals have everything they need to reach an efficient state of fraudulent\/malicious operation.<\/p>\n<p>We&#8217;ve recently spotted a commercially obtainable modular, <a href=\"https://www.webroot.com/blog/2013\/07\/02\/cybercriminals-experiment-with-tor-based-cc-ring-3-rootkit-empowered-spdy-form-grabbing-malware-bot\/\"><strong>Tor C&amp;C enabled<\/strong><\/a>, Bitcoin mining malware\/botnet generating tool. Let&#8217;s discuss its features, key differentiation factors and take a peek inside it&#8217;s Web-based command and control interface.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshots of the modular, Tor C&amp;C enabled, Bitcoin mining malware\/botnet generating tool&#8217;s Web based interface:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"303\" class=\"size-large wp-image-16240 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular-1024x303.png\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular-1024x303.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular-300x89.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular.png 1907w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"202\" class=\"size-large wp-image-16241 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_01-1024x202.png\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular_01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_01-1024x202.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_01-300x59.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_01.png 1568w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_03.jpg\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"226\" class=\"size-large wp-image-16242 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_03-1024x226.jpg\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular_03\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_03-1024x226.jpg 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_03-300x66.jpg 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_03.jpg 1678w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_06.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"277\" class=\"size-large wp-image-16245 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_06-1024x277.png\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular_06\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_06-1024x277.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_06-300x81.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_06.png 1570w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_071.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"206\" class=\"size-large wp-image-16248 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_071-1024x206.png\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular_07\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_071-1024x206.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_071-300x60.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_071.png 1892w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Priced at $250, and coded in C, the malware\/botnet generating tool supports all Windows versions (XP up to 8.1 on x86\/x64 hosts), and possesses the cybercrime ecosystem&#8217;s standard anti-debugging features. It also encrypts the plugins (modules), with AES-128-CBC. As a related key differentiation feature, it also applies a decent degree of OPSEC (Operational Security) to the bot&#8217;s Web-based command and control interface. A few examples are brute-force protection for the admin&#8217;s panel and SQL injection protection for the Web based interface. The OPSEC features introduced by the vendor are\u00a0<a href=\"http:\/\/ddanchev.blogspot.com\/2008\/06\/zeus-crimeware-kit-vulnerable-to.html\"><strong>an indication<\/strong><\/a>\u00a0for decent <strong><a href=\"http:\/\/www.zdnet.com\/blog\/security\/researchers-find-12-zero-day-flaws-targeting-5-web-malware-exploitation-kits\/6752\">situational awareness<\/a>\u00a0<\/strong>on behalf of the vendor in terms of the industry&#8217;s response to <a href=\"http:\/\/ddanchev.blogspot.com\/2009\/02\/help-someone-hijacked-my-100k-zeus.html\"><strong>large scale botnet infrastructures<\/strong><\/a> over the years.<\/p>\n<p>Not surprisingly, the vendor is also Tor-aware in the context of what we believe is a perceived value-added feature in terms of OPSEC. Compared to alternative competing malware\/botnet generating tools\/platforms within the cybercrime ecosystem, this bot&#8217;s\u00a0command and control domain structure is generated using\u00a0a\u00a0<a href=\"https://www.webroot.com/blog/2013\/03\/28\/new-diy-rdp-based-botnet-generating-tool-leaks-in-the-wild\/\"><strong>Domain Generation Algorithm (DGA)<\/strong><\/a> within the Tor network. While Tor can provide additional protection for domain hosting, it also has flaws. Case in point, the <a href=\"http:\/\/blogs.technet.com\/b\/mmpc\/archive\/2014\/01\/09\/tackling-the-sefnit-botnet-tor-hazard.aspx\"><strong>Sefnit botnet<\/strong><\/a>, which despite its reliance on Tor for C&amp;C communications which gave it a boost in terms of OPSEC\/growing infected population, ironically, also introduced a potentially exploitable third-party software, a vulnerable Tor client in this case.<\/p>\n<p><strong>Featured modules\/plugins:<\/strong><br \/>\n&#8211; DDoS bot functionality<br \/>\n&#8211; Form grabbing features &#8212; tested against major Web properties<br \/>\n&#8211; Socks5 module<br \/>\n&#8211; Passwords stealing module<br \/>\n&#8211; (Experimental) task-capable Bitcoin\/Litecoin mining feature<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_051.png\"><img decoding=\"async\" loading=\"lazy\" width=\"296\" height=\"436\" class=\"size-full wp-image-16257 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_051.png\" alt=\"Web_Tor_Malware_Botnet_Cybercrime_Modular_05\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_051.png 296w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/03\/Web_Tor_Malware_Botnet_Cybercrime_Modular_051-203x300.png 203w\" sizes=\"(max-width: 296px) 100vw, 296px\" \/><\/a><\/p>\n<p>Despite its experimental state, the bot&#8217;s vendor is also emphasizing on the fact that the prospective cybercriminal can also take advantage of any of the <a href=\"https://www.webroot.com/blog/2013\/12\/19\/peek-inside-booming-underground-market-stealth-bitcoin-litecoin-mining-tools\/\"><strong>commercially\/publicly obtainable stealth Bitcoin mining tools<\/strong><\/a>, like the ones we&#8217;ve been extensively profiling in a series of blog posts.<\/p>\n<p>We&#8217;ll continue monitoring this bot&#8217;s development and will post updates as soon as new developments take place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals continue to maliciously &#8216;innovate&#8217;, further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends &#8211; 2013 assessment back in December, 2013, namely, that the diverse cybercrime ecosystem is poised for exponential growth.\u00a0Standardizing the very basics of fraudulent and malicious operations, throughout the years, cybercriminals have successfully achieved a state [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[17673,17663,4863,9833,17669,17661,17657,16381,17675,17671,10155],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16231"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16231"}],"version-history":[{"count":21,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16231\/revisions"}],"predecessor-version":[{"id":32499,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16231\/revisions\/32499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16231"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16231"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}