Difference between revisions of "Atrax"

From Botnets.fr
Jump to navigation Jump to search
m (Text replacement - "OS1=" to "Target=")
m (Text replacement - "TOR" to "Tor")
Line 7: Line 7:
* dlexec – download and execute file
* dlexec – download and execute file
* dlrunmem – download file and inject it to browser
* dlrunmem – download file and inject it to browser
* dltorexec – download TOR executable file and execute
* dltorexec – download Tor executable file and execute
* dltorrunmem – download TOR executable file inject it to browser
* dltorrunmem – download Tor executable file inject it to browser
* update – update itself
* update – update itself
* install – download file, encrypt with AES and save to %APPDATA%
* install – download file, encrypt with AES and save to %APPDATA%
* installexec – download file, encrypt with AES and save to %APPDATA% and execute afterward
* installexec – download file, encrypt with AES and save to %APPDATA% and execute afterward
* kill – terminate all own threads
* kill – terminate all own threads
|Infrastructure=* On TOR (found by ESET): iloii7dnyotii3gr.onion (/auth.php)
|Infrastructure=* On Tor (found by ESET): iloii7dnyotii3gr.onion (/auth.php)
|UserAgent=Unknown
|UserAgent=Unknown
|CCProtocol=TOR
|CCProtocol=Tor
|Target=Microsoft Windows
|Target=Microsoft Windows
|Etat=Unknown
|Etat=Unknown

Revision as of 18:19, 3 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Atrax
Alias
Group Stealing
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Microsoft Windows
Origin
Distribution vector
UserAgent Unknown
CCProtocol Tor (Distributed-centralized)
Activity 2013 / Unknown
Status
Language
Programming language
Operation/Working group

Introduction

Features

Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
The rise of TOR-based botnetsAleksandr MatrosovESET2013