
SonicWALL UTM Research team observed reports of the Kneber Botnet today morning that compromised over 75,000 systems including government agencies worldwide. This is not a new Botnet but a standard Zeus Botnet that we have covered in detail in one of our SonicAlert last year - Zeus Trojan Family.
New variants of Zeus Botnet appear constantly in the wild. The name Kneber comes from the user name associated with one of its controller domain silence7.cn.
A look-up of this domain from http://whois.domaintools.com yields the following information where the registrant email address bears its last name 'Kneber', thus the name of this Botnet.
Name Server:free01.editdns.net
Name Server:free02.editdns.net
Registration Date: 2009-12-10 21:10
Expiration Date: 2010-12-10 21:10
This new variant has the following characteristics generic to Zeus Botnet:
Note: is the default windows installation folder. Typically its C:Winntsystem32 for Windows 2000 and NT and C:WindowsSystem32 for XP, Vista, and Windows 7.
Registry Modification:
This botnet modifies this registry entry to ensure its automatic execution on every Windows startup.
Key:
Value: "Userinit"
Original Data: "C:\WINDOWS\system32\userinit.exe,"
Modified Data: "C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\System32\sdra64.exe,"
SonicWALL Gateway AntiVirus provides protection against this Botnet via following GAV signatures:
Share This Article

An Article By
An Article By
Security News
Security News