www.marc-blanchard.com
Open in
urlscan Pro
87.98.134.15
Public Scan
Submitted URL: http://www.marc-blanchard.com/
Effective URL: http://www.marc-blanchard.com/BotInvaders/
Submission: On March 16 via manual from TW — Scanned from FR
Effective URL: http://www.marc-blanchard.com/BotInvaders/
Submission: On March 16 via manual from TW — Scanned from FR
Form analysis
0 forms found in the DOMText Content
TRACKER NEWS ABOUT < BAZARBACKDOOR VERSION 1 BazarBackdoor (also known as BazarLoader or Team9 Backdoor) is an alternate dev of the dreaded TrickBot Trojan. NOTICE: DGA are changing each month. Thanks to Johannes Bader for reversing and implementing the DGA BAZARBACKDOOR VERSION 2 BazarBackdoor Version 2 is another DGA version NOTICE: DGA are using special characters... it is normal ! Thanks to Johannes Bader for reversing and implementing the DGA ZOMBIE NECURS Necurs botnet is an historical network previously used for the distribution of Locky ransomware and Dridex, but today distributes some other malwares C&C servers are numerous and uses DGA. NYMAIM Nymaim gained banking capabilities and information stealer C&C servers infrastructures use fast-flux networks and DGA techniques are used. ZOMBIE COREBOT CoreBot is a rather sophisticated banking malware and information stealer C&C servers are numerous and CoreBot uses DGA. CHINAD Chinad activities are commonly downloading/uploading files, dropping other malware into the infected system. Its C&C servers become unstable detected with DGA methods QAKBOT Qakbot uses powerful information-stealing features to spy on users’ banking activity and defraud them of large sums of money. C&C servers constantly change with DGA methods ZLOADER Zloader is a part of Sphinx banking Trojan. ZLoader has resurfaced to take advantage of government relief payments amid COVID-19 to use DGA techniques PIZD PiZd is an important botnet. Its implant has over 1000 variants. Variants use DGA to access to C&C servers NEWGOZ Some mutations of the original Gamover constently appeared dubbed newGOZ.. The new DGA technique is not related to the original GameOver Zeus but bears some resemblance. DGA are used to keep updated implants through on C&C servers PITOU Pitou is a spambot using anti sandbox features and Domain Generation Algorithm for C&C discovering (thanks to @viql for analysis & code) TEMPEDREVE PART OF URSNIF FAMILY Tempedreve arrives on a system as a file dropped by other malware using daily Domain Generation Algorithm for its C&C TELERU TeleRU is the first observed Android APK related DGA. Thanks to Liang Jinjin for reversing and implementing the DGA QADARS Qadars is a botnet targeting EU victims to execute spy action's of users' banks accounts. Qadars may also infects an Android mobile device, it can monitor all user activity and hijack text messaging, Facebook users, online sports betting users, and e-commerce. C&C servers constantly change with DGA methods MATSNU Matsnu botnet uses DGA that pulls nouns and verbs from a built-in list of more than 1,300 words to form domains that are 24-character phrases. DGA method generates each 24 hours new domains PADCRYPT Padcrypt is a ransomware. Each day, new domains are used. Attachments are applying one of DGA daily list PROSLIKEFAN Proslikefan is a worm script. It sends exfiltration datas to daily new domains. The newest domains are using DGA techniques. LOCKY Locky ransomware has incorporated a domain name generating algorithm to improve the resilience of the command-and-control (C&C) communications. DGA techniques given how the malware is regularly updated with new functionality incorporating new attack techniques. PYKSPA Pykspa is a worm that accesses the list of Skype contacts and sends a chat message to each contact. It extracts personal user information from the machine and communicates with remote servers by using a Domain Generation Algorithms (DGA). RANBYUS Ranbyus bypasses payment transaction signing and authentication with smartcard devices. It also extracts personal user information from banking/payment softwares and sends to remote servers by using a Domain Generation Algorithms (DGA). MUROFET Murofet aka.LICAT, has relatioships with the ZeuS. It uses a Domain Generation Algorithm (DGA) to determine the current C2 domain names. Thanks to Johannes Bader for DGA reversing SISRON Sisron is a financial fraud and identity theft botnet. Infrastructures has been sinkholed, but on some victim's activities continue to work. Domain Generation Algorithms (DGA) are simple but should be good to continue to survey. Thanks to Johannes Bader for DGA reversing SYMMI Symmi is a botnet that has some functionalities to open a back door on the compromised computer. It lets to download malicious files. Domain Generation Algorithms (DGA) lets Symmi to send and receive informations and malwares. MYDOOM BOTNET MyDoom has several methods of impacts, but main attacks are DDOS MyDoom uses DGA for its P2P communications but also some Command and Control Server CONFICKER Version A, B, C stay alive! Most of hosts are sinkholed, but the infection stays -------------------------------------------------------------------------------- OPEN SOURCE REAL TIME MALWARE INFORMATION VERSION 1.0 SHARING IS CARING ! COPYLEFT 2020 - NO RIGHTS RESERVED KEYWORDS BOT INVADERS , BOTNET TRACKER, MALWARE, DOMAIN NAME, IOC, DOMAIN GENERATION ALGORITHMS, DGA