The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a Chinese drive-by attack . In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past . Analyzed sample 05749f08ebd9762511c6da92481e87d8 – The main sample, dropped by the exploit kit 5e2d07cbd3ef3d5f32027b4501fb3fe6 – Unpacked (Server.dll) 05dfe8215c1b33f031bb168f8a90d08e – The version from 2010 (reference sample) Behavioral analysis Installation After being deployed, the malware copies itself under a random name into a system folder, and then deletes the original sample: Its way to achieve persistence is by registering itself as a Windows Service. Of course, this operation requires administrator rights, which means for successful installation, the sample must run elevated. There are no UAC bypass capabilities inside the bot, so it can only rely on some external droppers, using exploits or ...
Comentarii
Trimiteți un comentariu