news
December 25, 2016by Cybersixgill

A New Threat Emerges from the Russian Cybercrime Underground

On December 12th, a cybercriminal going by the moniker Gosya presented a new malware solution for sale, a Trojan with advanced capabilities by the name of Nuke (or Nuclear) HTTP Bot. He claims several advantages to his trojan, including being fully written from scratch (unlike malware such as Carberp and Gozi which are inspired by and based on top of the pertinacious Zeus trojan). The Trojan is capable of injecting code in Chrome and Firefox, fully supports 32-bit and 64-bit systems alike, and bypasses UAC and Windows Firewall executions.

Similar to other modern malware, Nuke HTTP Bot is modular, with a base package available to the botnet herder and additional modules that are sold for an extra fee. Some of the modules that are highlighted in Gosya’s announcement are:

SOCKS proxy module

Formgrabber and Web-Injection module

Remote EXE file launcher module

Hidden VNC module for WinXP-Win10

Rootkit for 32-Bit and 64-Bit machines

Bot-killer – a mini anti-virus meant to remove all competing malware from the infected machine, if any are present.

Nuke HTTP Bot boasts a fairly small file size of just 83kb uncompressed, and 54kb compressed. The detection rate at the moment of writing this article is extremely low as well. Gosya presented evidence supporting the fact the malware is currently undetected by mainstream AV engines.

Figure 1: AV test run by the fraudster known as Gosya on his malware, Nuke HTTP Bot

MD5: 4dd0368f65c8f63e2dc568bd6ef2c968 SHA1: f77a744ec8b433da3f713d5909498c9c55cdaef9

A test version was already found in the wild by Netscout’s Arbor Networks. The author went on and mentioned that he is aware of it. The analyzed variation was a test version of the malware. The current version, according to Gosya, has much of the inner workings changed since Arbor’s report was published.

As of this moment, the full version of the malware, including the bypass of popular endpoint protection solutions and SOCKS module costs just $4000 as part of a New Year’s sale initiated by Gosya.

You may also like

March 14, 2023

Powerful new ‘stealc’ malware builds buzz on the underground

Read more

December 20, 2022

Android malware is proliferating on dark web markets

Read more
SOTU-Ransomware blog thumbnail

April 17, 2024

State of the Underground 2024: Two ways to guard against the ongoing threat of ransomware

Read more