{"id":3234,"date":"2010-09-10T09:39:11","date_gmt":"2010-09-10T15:39:11","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3234"},"modified":"2018-01-30T11:15:20","modified_gmt":"2018-01-30T18:15:20","slug":"cracked-trojan-maker-infects-prospective-criminals","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/09\/10\/cracked-trojan-maker-infects-prospective-criminals\/","title":{"rendered":"Cracked Trojan-Maker Infects Prospective Criminals"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2001.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/09\/10\/cracked-trojan-maker-infects-prospective-criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2011.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;title=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2021.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;title=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2031.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;title=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2041.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;title=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2051.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;Title=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2061.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2071.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2081.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;t=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2091.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F09%2F10%2Fcracked-trojan-maker-infects-prospective-criminals&amp;h=Cracked%20Trojan-Maker%20Infects%20Prospective%20Criminals\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2101.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2111.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zm2info1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-medium wp-image-3253\" title=\"20100910_arhack_zm2info\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zm2info1.jpg?w=300\" width=\"300\" height=\"188\" \/><\/a>In what seems to be a trend in my September blog posts, the research team has run across a program meant for criminally-minded people which has a nasty surprise inside.<\/p>\n<p>The program in question is called the <strong>ZombieM Bot Builder<\/strong>, which is used by the kind of upstanding citizens who spread Trojans in order to build up <em>botnets<\/em> &#8212; a collective of infected computers that can act as one entity. The creators of this program, an Argentinian group called <strong>Arhack<\/strong>, sell it for 180 euros. But don&#8217;t pull out your stolen credit cards just yet, because Arhack doesn&#8217;t take Visa: They sell this garbage <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_180euros_wu.jpg\" target=\"_blank\">exclusively via Western Union<\/a> money transfer.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_180euros.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-full wp-image-3245\" title=\"20100910_arhack_180euros\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_180euros.jpg\" width=\"187\" height=\"52\" \/><\/a>Well, someone has cracked both the earlier, <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zmcreator1.jpg\" target=\"_blank\">1.0 version of their bot generator<\/a> and <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zmcreator2.jpg\" target=\"_blank\">the latest, 2.0 version,<\/a> and posted it online for other criminals &#8212; the cheap kind, who don&#8217;t have 180 euros to spare &#8212; to use. The cracked version lets you use all aspects of the program to generate bots and manage the botnet without the need for a customized username and password, which you would otherwise need in order to start up the program.<\/p>\n<p>But there&#8217;s a hitch: Whenever you run the cracked version, it also installs <strong>Trojan-Backdoor-PoisonIvy<\/strong>, a different but equally nasty botnet Trojan. The <em>backstabbing Trojan trifecta<\/em> is in play.<\/p>\n<p><!--more--><\/p>\n<p>Can I get a &#8220;ha ha&#8221;?<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_haha.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3244\" title=\"20100910_arhack_haha\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_haha.jpg\" width=\"487\" height=\"307\" \/><\/a><\/p>\n<p>Like most PoisonIvy infections, the payload is a small executable in the user&#8217;s Temp folder. In this case, the 8704-byte PoisonIvy payload periodically checks in with <strong>m41k00l.no-ip.biz<\/strong>, which is an address used by a dynamic DNS service. At the moment, the IP address this domain points to belongs to a cable broadband ISP in Bogota, Colombia.<\/p>\n<p>We&#8217;ve added detection for this PoisonIvy sample into our definitions, but I have to admit, it&#8217;s hard for me to feel all that good about removing Trojans which exclusively target criminals.<\/p>\n<p>Looking at the claims Arhack makes about the ZombieMBot, there&#8217;s reason for some concern. The bot&#8217;s Web page claims the Trojan is capable of spreading itself via peer-to-peer file sharing networks, MSN messenger, removable media, and it can propagate over a network like a worm.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zmb_features.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3247\" title=\"20100910_arhack_zmb_features\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zmb_features.jpg\" width=\"454\" height=\"363\" \/><\/a><\/p>\n<p>The program&#8217;s &#8220;About&#8221; dialog explains that, no, really, this is only a tool for use by administrators for the purpose of remote management. It&#8217;s hard to imagine the coder who wrote this dialog keeping a straight face, especially when the makers call themselves &#8220;Arhack&#8221; and host their malcode on their Web site, <strong>troyanosyvirus.com <\/strong>(That&#8217;s Spanish for <em>Trojans and Virus<\/em>).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zm2info.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3248\" title=\"20100910_arhack_zm2info\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_zm2info.jpg\" width=\"398\" height=\"250\" \/><\/a><\/p>\n<p>The Web site even gives helpful compatibility and system requirement information.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_compatibility.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3246\" title=\"20100910_arhack_compatibility\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/09\/20100910_arhack_compatibility.jpg\" width=\"453\" height=\"487\" \/><\/a><\/p>\n<p>The big danger here is that the product of this Trojan creation tool is out in the open, freely available for anyone to download and use. Fortunately for people on the receiving end of such a Trojan, the Trojans this tool is capable of building are so rudimentary that it only took the researcher working this project an hour to build detection into Webroot&#8217;s antimalware engine that can sniff out any ZombieMBot executable generated by the tool.<\/p>\n<p>Meanwhile, if anyone in law enforcement from Argentina is paying attention, you might want to take a look at Arhack. Last year, Argentina ranked in a list of the <a href=\"http:\/\/images.businessweek.com\/ss\/09\/07\/0707_ceo_guide_security\/4.htm\" target=\"_blank\">20 countries most affected by malicious computer activity<\/a>. I find it hard to believe Arhack can operate their business in the open without anyone noticing.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In what seems to be a trend in my September blog posts, the research team has run across a program meant for criminally-minded people which has a nasty surprise inside. The program in question is called the ZombieM Bot Builder, which is used by the kind of upstanding citizens who spread Trojans in order to [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,4263,7931,7923,7927,6161,7925,7073,7933,3713,7929,4441,4137,4533,4143,4415,3471,5759,4313,4621],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3234"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3234"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3234\/revisions"}],"predecessor-version":[{"id":17104,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3234\/revisions\/17104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3234"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3234"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}