Hello,
For those who are interested i run a little zbot tracker here: http://cybercrime-tracker.net/zbox.php
It can proceed Citadel, Zeus 2.x and Ice IX, other exotic variants such as zeus gameover aren't supported due to the amount of work and the technicity to extract config.
For the background it's a Cuckoo sandbox with Volatility and the plugin ZbotScan hosted on a OVH Kimsufi.
The tracker is auto-feeded from various free malware feeds (malekal, vx.vault, abuse.ch, malwr, etc..) samples are flushed after being proceded/reported on VirusTotal, sometime it freeze but well... already 1340 samples got analysed.
For the submission form, after someone submit a sample, the sample isn't processed automatically, i add them manually to Cuckoo.
If you want an example of work, this sample from today here: https://zeustracker.abuse.ch/monitor.ph ... home.co.kr
Reported on VT as:
For those who are interested i run a little zbot tracker here: http://cybercrime-tracker.net/zbox.php
It can proceed Citadel, Zeus 2.x and Ice IX, other exotic variants such as zeus gameover aren't supported due to the amount of work and the technicity to extract config.
For the background it's a Cuckoo sandbox with Volatility and the plugin ZbotScan hosted on a OVH Kimsufi.
The tracker is auto-feeded from various free malware feeds (malekal, vx.vault, abuse.ch, malwr, etc..) samples are flushed after being proceded/reported on VirusTotal, sometime it freeze but well... already 1340 samples got analysed.
For the submission form, after someone submit a sample, the sample isn't processed automatically, i add them manually to Cuckoo.
If you want an example of work, this sample from today here: https://zeustracker.abuse.ch/monitor.ph ... home.co.kr
Reported on VT as:
Code: Select all
full infos:
Malware family ZEUS
MD5 b73aa307e8c2328f6a7dfde1a1f024fc
Version 2.0.8.9
RC4 Keystream 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
gate.php URLs
URLs http://neorandom.dothome.co.kr/ch/images/youtube/pics.bin
Code: Select all
On a Citadel:
{
"_id" : ObjectId("5347c85fa47c202369897125"),
"zbotscan" : {
"zbotscan" : {
"data" : {
"injected_process" : {
"malware_zbot" : "ZEUS",
"process_name" : "explorer.exe",
"computer_identifier" : "COMPUTER_1_7875768F1E829C61",
"process_id" : 1500,
"process_address" : "31457280",
"zbot_version" : " 2.0.8.9",
"executable" : "Inpi\\hace.exe",
"config_rc4_keystream_plaintext" : "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",
"data_file" : "Toata\\niizc.uwk",
"mutant_key" : "3104715416",
"xor_key" : "1370719834",
"urls" : [
"http://neorandom.dothome.co.kr/ch/images/youtube/pics.bin"
],
"registry" : "{'Value3': 'Yxtoacz', 'key_path': 'HKEY_CURRENT_USER\\\\SOFTWARE\\\\Microsoft\\\\Ixpu', 'Value1': 'Xygut', 'Value2': 'Pyxytuvao'}"
}
},
"config" : {}
}
}
}
Code: Select all
full infos:
Malware family CITADEL
MD5 3ed3bf51ce7c9879d694179dadf10fd3
Version 1.3.5.1
RC4 Keystream 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
URLs http://coryaiken3948.esy.es/citadel/file.php|file=config.dll
http://coryaiken3948.esy.es/citadel/file.php|file=config.dll
Code: Select all
An RSS feed is also available here: http://cybercrime-tracker.net/zbox_rss.php{
"_id" : ObjectId("5347c968a47c2025538971c2"),
"zbotscan" : {
"zbotscan" : {
"data" : {
"injected_process" : {
"xor_key" : "0",
"executable" : "Cyeq\\xiyz.exe",
"comm_rc4_key_plaintext" : "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",
"aes_key" : "9F474B22BDBEAAB6EF0758DC35ECD704",
"config_rc4_keystream_plaintext" : "0aea2e24deed2867011acc6c76c0865c27351f1902d3a1912a443bd6b93f250f8b5e534ea8be5705f1a53e8b1455433f4a842dcea06e804af06394c7e4864b266fa126e7a29068ab8d5fb56a070e27235854003da39a75b6aa0905b133fff0805b945e7f9d04c24f1fd8c50092ac04e2fb613659c2d173de9b91c6551c1ba634508c10e342390ff07f647020b374bb2ec743b16898ab9654f2e2c927f94fc06fd0e38b32514661d84534b8b8c32f41754ed7783a6b9545d41382b739ec77fd74dde8dfcbb2c1325e11fc19f9296281cf196caca8938ad977e99f203ec6b874b783adf91f10bafc14db97d26bd9e7089bf6bc9ef7e67148187a80f787faeb0ee1",
"malware_zbot" : "CITADEL",
"process_name" : "explorer.exe",
"mutant_key" : "2037936473",
"computer_identifier" : "COMPUTER_1_7875768F1E829C61",
"aes_xor_key" : "FCA4C13246F5C8ABD0C5CFDC7350AB42",
"process_id" : 1500,
"process_address" : "34865152",
"login_key" : "C1F20D2340B519056A7D89B7DF4B0FFF",
"urls" : [
"http://coryaiken3948.esy.es/citadel/file.php|file=config.dll",
"http://coryaiken3948.esy.es/citadel/file.php|file=config.dll"
],
"zbot_version" : " 1.3.5.1",
"registry" : "{'Value3': 'Ceilvuwy', 'key_path': 'HKEY_CURRENT_USER\\\\SOFTWARE\\\\Microsoft\\\\Irty', 'Value1': 'Yxebaryta', 'Value2': 'Posao'}"
}
},
"config" : {}
}
}
}