MaMa / Casper / plaNETWORK / sun4u Bot Search scanners under monitoring

Previously I wrote a blog post about the ByroeNet/Casper-Like bot scanners, and adapted some ET rules in order to detect these bots activities.

The 1010041 rule focus on all “MaMa” scanners (MaMa CaSpEr, MaMa CyBer, MaMa ebes, etc.), the 1010040 rule focus on all “Bot Search” scanners (b3b4s, Casper, dex, Jcomers, kmccrew, plaNETWORK, sasqia, sledink, etc.) and the ET 2011244 rule focus on all “sun4u” scanners (Mozilla/4.76 [ru] (X11; U; SunOS 5.7 sun4u), etc.).

Until first August the rules where under testing, so the previous values are incorrect.

Here under you can find real time graphs for the 3 different rules.

Monthly event activity for rule 1010040
Monthly event activity for rule 1010040
Monthly event activity for rule 1010041
Monthly event activity for rule 1010041
Monthly event activity for rule 2011244
Monthly event activity for rule 2011244
Montly TOP 10 Source IPs for rule 1010040
Montly TOP 10 Source IPs for rule 1010040
Montly TOP 10 Source IPs for rule 1010041
Montly TOP 10 Source IPs for rule 1010041
Montly TOP 10 Source IPs for rule 2011244
Montly TOP 10 Source IPs for rule 2011244

Interfree.it Botnet Activities

Interfree.it is an Internet Service provider how give to his users a free email and a free web site hosting space. Interfree.it is also providing a free sub domain for each created account (ex : http://yourname.interfree.it).

Since the start of our Honey Net in Feb. 2009 we have directly observe that some malware scripts where located on Interfree.it and participate actively to a bonnet construction and propagation.

Interfree.it server, how is hosting the major botnet script, has the IP 213.158.72.68. Since Feb. 2009 to end Jun 2010, Interfree.it botnet is composed of few different malware hosters, has generate 2 807 events and 169 attackers have call the botnet files located on the hosters servers.

Italy, US and Russia are the countries how are the most participating to the botnet activity in term of events. Italia and US are the countries how are hosting part of the botnet since more than 100 days. Interfree.it botnet could be considered as a small botnet.

May 2010 was the more active month in term of events, May 2010 the month with the most distinct attackers and March 2010 the month with the most detected hosters.

Since April 2010 we can see that the activity of the botnet is increasing.

Interesting point the FileAve.com, the Kortech.cn and the Interfree.it Botnet are linked together between some few hosters. Just check the available Afterglow visualization of the interaction between the two botnets.

I have generate some stats and graphs, with all the associated raw datas how are available here.

Kortech.cn Botnet Activities

Kortech.cn is a Chinese website, located in Shangai China.

Since the start of our HoneyNet in Feb. 2009 we have directly observe that one “Tier RFI” where located on Kortech.cn and participate actively to a bonnet propagation.

Kortech.cn server, how is hosting the major botnet script, has the IP 218.5.74.92. Since Feb. 2009 to end Jun 2010, FileAve.com botnet is composed of 39 different malware hosters, has generate 8 134 events and 353 attackers have call the botnet files located on the hosters servers.

China, Germany, Colombia and South Korea are the countries how are the most participating to the botnet activity in term of events. China, South Korea, Germany and US are the countries how are hosting part of the botnet since more than 100 days.

March 2010 was the more active month in term of events, April 2009 the month with the most distinct attackers and March 2010 the month with the most detected hosters. Since December 2009 we can see that the activity of the botnet is increasing.

Interesting point the FileAve.com Botnet and the Kortech.cn Botnet are linked together between some few hosters. Just check the available Afterglow visualization of the interaction between the two botnets.

I have generate some stats and graphs, with all the associated raw datas how are available here.