Hi,
I was analysing both versions that you sent me and third one I discovered recently... I found out that:
1) EP_X0FF was right and the sample that you gave us was in deed related to Darkness. When I run the malware in my lab the host was trying to connect to vkotalke.info C&C server which is supposed to be one of the newest Darkness C&C servers (the full list you can find if you visit link posted by Evilcry:
http://www.shadowserver.org/wiki/pmwiki ... r/20110123). Unfortunately, bot couldn't connect... already dead? Or maybe it's the reason of my NAT?
2) The second and third sample was trying to connect to three C&C servers: greatfull-toolss.ru, hellcomeback.ru, greatfull.ru but these are also not working any more... in the attachment I put one sample of traffic if someone wants to take a look closer...
I will probably try to change binaries in order to connect to servers which still exist (if it is possible because in newer versions of Darkness it is said that modification of binaries is not that easy)... Second attachment is the next sample of the malware... maybe someone will be interested in...
Regards,
korczyn