[nsp-sec] Heads-up BT (2856): Nasty DDoS Botnet C&C in your neck of the IP Woods

White, Gerard Gerard.White at aliant.ca
Thu Sep 18 19:14:27 EDT 2008


Greetings

Check for flows to:

AS      | IP               | AS Name
2856    | 86.158.74.89     | BT-UK-AS BTnet UK Regional network

on a variety of TCP ports...  Currently using TCP/3070 right now
with this rather unique (to me) malware identified as:
http://www.virustotal.com/analisis/c1f289289aba5238f294e91ae165d3cf

What makes this Bot unique to me is the ASCII based comms it employs:

Bot> Status*(Idle...)*
C&C< kill-77.74.196.203 :27016%
Bot> Status*(UDP Attack Running!)*
C&C< stop-kill
Bot> Status*(Idle...)*

Meanwhile this poor UKSERVERS server in this example proceeded to take
quite the spankin' afterwards...  There is an appropriate UDP payload
of "X-R own you bitch!"

DNS-RRs include:
de9.no-ip.info       (This unique Bot)
dxcvg94.scrapping.cc ("Traditional" IRC Bot on TCP/8334 using
msn-spreading
                      techniques for propagation)

I have strong reason to believe this "Agent.BL" bot was involved in the
"shadowserver" spanking
in the past several days...

GW
855 - Bell Aliant




More information about the nsp-security mailing list