Janidos V3 _HOT_ Download
LINK https://shurll.com/2tdFhp
WootBot (aka DooRBot) appears to be a variant of Gallipoli Bot. There are no booter/bot hooks in the malware but it does include one executable that gets installed on network shares. This executable is the main malware payload which installs itself as the startup service.
Epsilonx is a Windows/.NET bot which executes a script to connect to the host using the package "kyEgTz", uninstall itself and then copies the binary payload from the first stage to the second stage. The packaged binary is in fact a small.NET application that appears to be a tool for network enumeration. The second stage binary is the standard malware executable that is downloaded by the infected machine.
The.NET executable is a novelty in that it is not a CSD-style executable. It is instead a.NET wrapper around an Embed Assembler.NET payload. Embed Assembler.NET is a.NET class that is loaded as a system assembly that allows for assembly embedding. The.NET wrapper is written by the.NET Framework and adds basic networking code for the.NET developers.
Because of the.NET wrapping, the malware appears to be a.NET application that is somewhat easier to debug than a traditional CSD/.CPP/C style executable. However, the Embed Assembler.NET payload is poorly written. I removed some of the memory allocation and analysis of the malware is greatly simplified. d2c66b5586