Sunday 11 November 2012

Backdoor.Nucleroot/Win32.Umbald.A (Umbra Loader)

Almost FUD, detected by NOD32 and Kaspersky. (2/44)

Crypted with a dirty DotNet crap

Once unpacked it's another story (33/44)

Read the ressources DLL0/1/2 and CFG

Get the config.

Do some registry shit, parse the config url get the pc name...

Call the gate.

Furtivity fail:



Wait order:

Call the gate each 2 minute for order

Order:


Retrieve and execute:

Return mode=3 to says order is done

Task complete.

Umbra thread:

Login:

Dashboard:

Start:

File upload:

Install:

Bots:

Commands:

Country statistics:

Cpanel:

Botnet hosted on reliahost.net, they are know for hosting malwares, warez and porn.

ReliaHost website:

Unbra Loader builder:
Builder MD5: 91eda4acfb9da021d4f7b91e780b12be

No comments:

Post a Comment