Features

From Botnets.fr
Revision as of 13:43, 8 August 2015 by Eric.freyssinet (talk | contribs)
Jump to navigation Jump to search
 Feature category
Open website in browserAnnoyance
Pop-upAnnoyance
Disable network adaptersAnnoyance
Encrypt without C&C connectionAnnoyance
Lock systemAnnoyance
Erase filesAnnoyance
Encrypt filesAnnoyance
MBR overwriteAnnoyance
Decryption of locked filesAnnoyance
Encrypt MFTAnnoyance
Display pop-up messageAnnoyance
Launch delayArmor
Removal of competing malwareArmor
Register as print processorArmor
Anti-virus uninstallArmor
String stackingArmor
Monitor mouse eventsArmor
Store data in ADSArmor
DNS blocking of AV companiesArmor
Virtual machine detectionArmor
Check CPU name in registryArmor
Server-side polymorphismArmor
Hidden file storageArmor
Debugging detectionArmor
Anti-virus blockingArmor
PolymorphismArmor
Video screen captureAudio visual
Camera captureAudio visual
Microphone captureAudio visual
Screen captureAudio visual
BackdoorBackdoors
VNC serverBackdoors
Backconnect serverBackdoors
NetcatBackdoors
Mozilla browser extensionBrowser extensions
AffiliationCommercial model
KitCommercial model
Anti-virus checkingCriminal services
Bullet-proof hostingCriminal services
CardingCriminal services
ForumCriminal services
Credit card checkingCriminal services
Pay-per-installCriminal services
Traffic distribution serviceCriminal services
TDSCriminal services
ExchangeCriminal services
Double fastfluxDNS and URL features
Dynamic DNSDNS and URL features
Handle generation algorithmDNS and URL features
Fast fluxDNS and URL features
Domain generation algorithmDNS and URL features
Chrome browser extensionData theft
Friendster password theftData theft
JDownloader password theftData theft
POP3 password theftData theft
FTP client password theftData theft
Sendspace password theftData theft
Vkontakte password theftData theft
Windows products ID theftData theft
Paypal password theftData theft
Memory scrappingData theft
Password theftData theft
FTP password theftData theft
VNC password theftData theft
HTTP password theftData theft
Software ID theftData theft
Email password theftData theft
Email harvestingData theft
FileZilla password theftData theft
Certificate theftData theft
Contact theftData theft
Mozilla Sqlite data theftData theft
Facebook password theftData theft
Netflix password theftData theft
Document theftData theft
Bitcoin wallet theftData theft
Outlook password theftData theft
Web password theftData theft
Firefox cookie theftData theft
Banking credential theftData theft
File theftData theft
Twitter password theftData theft
WoW password theftData theft
Browse file systemsData theft
Internet Explorer password theftData theft
Mail client password theftData theft
Cookie theftData theft
Pidgin password theftData theft
Bebo password theftData theft
Form data theftData theft
AOL password theftData theft
Credit card data theftData theft
IM password theftData theft
Browser password theftData theft
Data theftData theft
Firefox password theftData theft
Luhn algorithm checkData validation
Regular expression filteringData validation
UDP floodDenial of service
DDoSDenial of service
Slow POSTDenial of service
Bandwidth floodDenial of service
Layer 7 attackDenial of service
BooterDenial of service
GET floodDenial of service
HTTP floodDenial of service
POST floodDenial of service
SlowlorisDenial of service
GRE floodDenial of service
TCP floodDenial of service
SYN floodDenial of service
ApacheKillerDenial of service
MSN vectorDistribution vector
Brute-forceDistribution vector
USB vectorDistribution vector
Shared drive vectorDistribution vector
SQL InjectionDistribution vector
Skype vectorDistribution vector
Torrent vectorDistribution vector
WormDistribution vector
YIM vectorDistribution vector
Facebook vectorDistribution vector
Removable drive vectorDistribution vector
Social network vectorDistribution vector
Email wormDistribution vector
RDP vectorDistribution vector
Right-to-left overrideDistribution vector
Data compressionEncoding
XOR encodingEncoding
JPEG encodingEncoding
Base64 encodingEncoding
AES encryptionEncryption
Custom C&C encryption algorithmEncryption
Elliptic curve encryptionEncryption
SteganographyEncryption
Diffie-HellmanEncryption
Custom XOR-based encryptionEncryption
Custom encryption algorithmEncryption
Twofish encryptionEncryption
Encryption of captured dataEncryption
RC4 encryptionEncryption
.lukitusFile extension
.cerberFile extension
Javascript injectionInjections
Automated transfer system (ATS)Injections
Man in the browserInjections
Java Signed Applet Social Engineering Code ExecutionInjections
Dynamic webinject configuration updateInjections
WebinjectInjections
Voice-over-IP surveillanceInterception
KeyloggerInterception
SPDY grabbingInterception
Winpcap interceptionInterception
IM surveillanceInterception
Email surveillanceInterception
Network sniffingInterception
SMS interceptionInterception
Skype surveillanceInterception
MTAN interceptionInterception
UninstallMaintenance
LoggingMaintenance
Upload minidumpMaintenance
Network information gatheringMaintenance
Phone homeMaintenance
System information gatheringMaintenance
Port scanningMaintenance
UpdateMaintenance
DebuggingMaintenance
GeolocalisationMaintenance
SMS paymentMonetization
Bitcoin paymentMonetization
Premium callsMonetization
Premium servicesMonetization
MoneXy paymentMonetization
Premium SMSMonetization
Display advertising pop-upsMonetization
VMProtectObfuscators
ThemidaPackers
Custom packerPackers
EnigmaPackers
TELockPackers
UPX PackingPackers
ArmadilloPackers
Visual Basic crypterPackers
UPX ProtectorPackers
Cross-infectionPotency
SOCKSProxy
HTTP proxyProxy
SOCKS5Proxy
ProxyProxy
Remote controlRemote control
Command shellRemote control
File executeRemote control
File uploadRemote control
Run commandsRemote control
Kill system processesRemote control
File downloadRemote control
Query system processesRemote control
CAPTCHA display to solveResource exploitation
Click fraudResource exploitation
Bitcoin miningResource exploitation
Web serverResource exploitation
BIOS installationRootkit
RootkitRootkit
BootkitRootkit
MBR installationRootkit
Gmail spamSpam
SMS spamSpam
Produce spam from templatesSpam
PhishingSpam
Send spamSpam
PharmingTraffic hijacking techniques
Startpage modificationTraffic hijacking techniques
Hosts modificationTraffic hijacking techniques
DNS configuration modificationTraffic hijacking techniques
Search results manipulationTraffic hijacking techniques
URL redirectionTraffic hijacking techniques
DNS hijackTraffic hijacking techniques
Component Object Model (COM)Tunnel
MailslotTunnel