Analysis of Zeus version 2.1.0.1 (http://cybercrime-tracker.net/zbox.php)

Timeline

Fri May 30 10:31:48 CEST 2014

start win8 already INFECTED... win 8 infected with 5b1e1e909a6efca6cabc0fad8a0458a6

It is generating flows in the rrd, so it is ok. I copied the previous pcap file of ~6GB.

Fri Jun 6 09:14:13 CEST 2014

Jin run out of space. I stopped it without desinfecting. The pcap is safe.

CC

The command and control server is 81.88.48.95, port 80/tcp These Netflows are labeled "From-Botnet-TCP-HTTP-Zeus.CC.NonEncrypted-1" in the binetflow file.

In this capture, all the C&C connections are made to a server that is down. It is still an infected Zeus, but the C&C is not working. The connections are like this:

GET /Zz/config.bin HTTP/1.1
Accept: */*
Connection: Close
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)
Host: eyeofgod1.com
Cache-Control: no-cache

HTTP/1.1 403 Forbidden
Date: Tue 13 May 2014 14:19:10 GMT
Server: Apache
Last-Modified: Tue 24 May 2011 06:44:15 GMT
Accept-Ranges: bytes
Content-Length: 2431
Connection: close
Content-Type: text/html
Content-Language: fr

<?xml version="1.0" encoding="UTF-8"?>.<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">.<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">..<head>...<meta http-equiv=",

This change happened on 1970/01/01 07:03:13.638947 in pcap file, and on Tue 13 May 2014 14:19:10 GMT in real life time.

If you are going to analyze this Zeus behavior, consider that most of the C&C was taken down.

To see a working Zeus C&C see the capture called CTU-Malware-Capture-Botnet-78-1