DDoSseR leads to Gh0st RAT

The malware BKDR_ADDNEW, better known as 'DaRK DDoSseR' in the underground, is a tool that provides distributed denial of service (DDoS) capability combined with password stealing functionality. The tool costs $30 and has been available for several years.

Recently, our friends at FireEye reported seeing computers that had been compromised by BKDR_ADDNEW and later updated with Gh0st RAT. While Gh0st RAT has been used in many targeted attacks, this threat and its many variants (PDF), are widely available to both APT actors and cybercriminals alike.

When executed, BKDR_ADDNEW connects to a TCP port (the ports used by the samples analyzed were 443, 3176 and 3085 but the default port is 3175) to receive remote commands from a malicious operator. Some of the available commands include downloading of files, stealing Mozilla Firefox passwords, showing DNS, and sending application privileges among others. It also has the capability to launch denial of service (DOS) attacks.

Based on our investigation, BKDR_ADDNEW has built-in functionality that allows malicious actors to “update” the malware on a compromised computer.

Using this functionality it would be simple for the operators of a DaRK DDoSseR botnet to instruct the compromised systems under their control to download and execute Gh0st RAT.

Why would both types of malware be present on a compromised computer? There are a number of alternative explanations:

  • The owners of a DaRK DDoSseR-based botnet have sold “installs” to other cybercriminals. There is a thriving underground market for already compromised computers and this could be a case or change of ownership.
  • While DaRK DDoSseR has denial of service capability and the ability to steal passwords it is not a fully featured RAT (remote access tool) that is capable of file browsing, taking screen screenshots, and turning on a microphone or webcam. Perhaps the operators of this botnet wanted some additional functionality so they instructed the already compromised hosts to download and install Gh0st RAT.

You may also consult our earlier blog posts that have discussed other RATs such as JACKSBOT, PlugX, and Poison Ivy:

Trend Micro protects users from this threat via the Smart Protection Network that detects the said malware.

Tags: DaRK DDoSseR, Gh0st RAT, malware

Turkey’s ISPs hijack Google’s DNS service, killing bypass for Twitter, YouTube ban

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos SafeGuard Enterprise

Your central key for data protection

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.