{"id":29166,"date":"2013-09-12T16:02:00","date_gmt":"2013-09-12T23:02:00","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=29166"},"modified":"2025-05-27T22:19:25","modified_gmt":"2025-05-28T05:19:25","slug":"andromeda-botnet-hides-behind-autoit","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/","title":{"rendered":"Andromeda Botnet Hides Behind AutoIt"},"content":{"rendered":"<p>Last month, I posted a <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/bitcoin-miners-use-autoit-complied-programs-with-antianalysis-code\">blog<\/a> about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used AutoIt scripts for a long time, and they are gaining in popularity due to their flexible and powerful nature. We have now come across another piece of malware (which turns out to be part of the Andromeda botnet) compiled with AutoIt to execute its malicious code. The botnet uses an AutoIt script to hide its malicious code and executes the code using AutoIt&#8217;s APIs. The Exe2Aut program can extract the contents of the main binary file as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29167\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png\" alt=\"anrdomeda_autoit_decode\" width=\"300\" height=\"134\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-1024x458.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode.png 1303w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>As shown above, the script is easy to understand, and drops a source file containing script code and two embedded files&#8211;a.vbs and f.txt&#8211;whose contents are shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_files_dropped1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29197\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_files_dropped1-300x141.png\" alt=\"andromeda_files_dropped\" width=\"300\" height=\"141\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_files_dropped1-300x141.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_files_dropped1-1024x482.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_files_dropped1.png 1656w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>These look like simple plain-text files. The script drops a copy of itself in the start-up directory with the name config.exe. It then copies dropped files into a temp folder and executes a.vbs, which contains a base64 string and code to decrypt it. Once executed, the malware will drop another file, ensambla.txt, in the temp folder. The script calls DllStructCreate(), which creates a structure similar in style to C\/C++ to be used in DllCall() for f.txt and ensambla.txt. The script next executes two local variables containing binary data by using Execute(BinaryToString()). Let\u2019s pop up those variables using the AutoIt MsgBox() function to see the actual code:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_varibales.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29169\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_varibales-300x76.png\" alt=\"andromeda_varibales\" width=\"300\" height=\"76\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_varibales-300x76.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_varibales.png 829w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The script sets the DLL structure data and executes the DLL procedure using AutoIt&#8217;s DllCall() function. The file f.txt contains the \u201cMZ\u201d header, the malicious code that turned out to be a new Andromeda botnet sample. (A few recent blogs have covered Andromeda; one of them published <a href=\"http:\/\/www.0xebfe.net\/blog\/2013\/03\/30\/fooled-by-andromeda\/\">a nice analysis.)<\/a> The code from published blogs looks very similar to our dropped file, but different CRC32 hashes for process names at the start of the code drew my attention. After some analysis, it turned to be a variant of Andromeda using a custom hash algorithm to generate hashes for process names, as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_algo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29200\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_algo-300x229.png\" alt=\"andromeda_custom_hash_algo\" width=\"300\" height=\"229\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_algo-300x229.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_algo.png 905w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>At the start, the binary checks for the mutex name \u201clol,\u201d gathers running process names, calculates hashes using a custom algorithm, and compares them with hard-coded hashes. I found a few obvious process names but not all. (I&#8217;d like to thank my colleague Subrat Sarkar, who quickly wrote a small utility based on the preceding algorithm. It gave me a custom hash for process names as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_utility.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29202\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_utility-300x61.png\" alt=\"andromeda_custom_hash_utility\" width=\"300\" height=\"61\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_utility-300x61.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_custom_hash_utility.png 678w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Guessing all the process names along with hard-coded hashes manually would be a bad idea. So the idea is to collect all antimalware tools, VMware\/VirtualBox\/Sandboxie, and other the analysis tools process names to generate and compare hashes. That will help us identify all the process names this binary is looking for. So I quickly wrote a Perl script to generate hashes for all candidates, as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_perl_hash_output.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29203\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_perl_hash_output-268x300.png\" alt=\"andromeda_perl_hash_output\" width=\"268\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_perl_hash_output-268x300.png 268w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_perl_hash_output.png 511w\" sizes=\"auto, (max-width: 268px) 100vw, 268px\" \/><\/a><\/p>\n<p>I was able to get all the process names used by this binary. All hard-coded hashes correspond to process names shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_all_process_names.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29204\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_all_process_names-300x145.png\" alt=\"andromeda_all_process_names\" width=\"300\" height=\"145\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_all_process_names-300x145.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_all_process_names.png 895w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>If no matching process is found, then it will check for Sandboxie\u2019s sbiedll.dll.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_sbiedll_check.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29206\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_sbiedll_check-300x50.png\" alt=\"andromeda_sbiedll_check\" width=\"300\" height=\"50\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_sbiedll_check-300x50.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_sbiedll_check.png 740w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2><b>Andromeda trick fails<\/b><\/h2>\n<p>I was aware of an anti-VMware and antidebugging trick used by Andromeda. It checks if you are running a virtual machine by looking for a key under the \u201csystem\\currentcontrolset\\services\\disk\\enum&#8221; registry key and then doing string matching and a timing check using the \u201crdtsc\u201d instruction for antidebugging. But both the tricks failed for this binary. Let\u2019s see why.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_failed_checks.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29207\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_failed_checks-300x126.png\" alt=\"andromeda_failed_checks\" width=\"300\" height=\"126\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_failed_checks-300x126.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_failed_checks-1024x431.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_failed_checks.png 1363w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>The trick used to get the string \u201cvmaw,\u201d \u201cvbox,\u201d or \u201cqemu\u201d fails because VMware 9 has a different string in the registry. Thus EAX+8 fails to get the required string.<\/li>\n<li>Even if the trick finds \u201cawmv\u201d (the reverse of &#8220;vmwa&#8221;) for older VMware versions, it checks using \u201c61776D77,\u201d which when converted to characters becomes \u201cawmw.\u201d The hard-coded hex string is wrong in this case (because the last byte, 77, is wrong). It should be \u201c61776D76,\u201d which when converted to characters becomes \u201cawmv.\u201d<\/li>\n<li>The binary contains antidebugging code using the rdtsc instruction, which doesn\u2019t have a jump instruction to exit (so you can continue your analysis without any worries).<\/li>\n<\/ul>\n<p>I was not convinced about these failed checks and thought these flaws might exist only for this particular binary. To cross-check I examined a few samples generated by Andromeda 2.06 builder (leaked on the Internet) and found all of these flaws exist in all of the binaries.<\/p>\n<p>Once you bypass all antireversing tricks, the binary calls the main payload, which creates the Windows process wuauclt.exe (Windows Update) in suspended mode, as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_createprocess.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29208\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_createprocess-300x241.png\" alt=\"andromeda_createprocess\" width=\"300\" height=\"241\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_createprocess-300x241.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_createprocess.png 535w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Before that, the malware uses the following Windows APIs to create different sections and map them with malicious code.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_section_mapping.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29209\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_section_mapping-300x96.png\" alt=\"andromeda_section_mapping\" width=\"300\" height=\"96\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_section_mapping-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_section_mapping.png 850w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Interestingly, the binary then injects some code at the entry point of wuauclt.exe. Here is the code injection:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_injected_code.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29210\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_injected_code-300x146.png\" alt=\"andromeda_injected_code\" width=\"300\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_injected_code-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_injected_code-1024x501.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_injected_code.png 1275w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The binary injects \u201cPUSH 000A13B9, RET\u201d instructions. So when ZwResumeThread() is called, wuauclt.exe will push the address \u201c000A13B9\u201d on the stack and return. This way malicious code will be executed in the context of the Windows process wuauclt.exe, shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_run_payload.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-29211\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/andromeda_run_payload-300x158.png\" alt=\"andromeda_run_payload\" width=\"300\" height=\"158\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_run_payload-300x158.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_run_payload-1024x540.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/andromeda_run_payload.png 1361w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The control server is still active at the time of writing this blog. Attackers are using AutoIt scripts to hide and install malicious payloads. This example shows that AutoIt has easy and powerful APIs for executing malicious code. The Andromeda sample we analyzed also shows us a variety of methods used by the attackers, including custom hash generation for process names, anti-VMware\/antidebugging techniques, and process injection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[49,180],"coauthors":[3973],"class_list":["post-29166","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-botnet","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Andromeda Botnet Hides Behind AutoIt | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Andromeda Botnet Hides Behind AutoIt | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-12T23:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:19:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1303\" \/>\n\t<meta property=\"og:image:height\" content=\"583\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Andromeda Botnet Hides Behind AutoIt\",\"datePublished\":\"2013-09-12T23:02:00+00:00\",\"dateModified\":\"2025-05-28T05:19:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png\",\"keywords\":[\"botnet\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\",\"name\":\"Andromeda Botnet Hides Behind AutoIt | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png\",\"datePublished\":\"2013-09-12T23:02:00+00:00\",\"dateModified\":\"2025-05-28T05:19:25+00:00\",\"description\":\"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Andromeda Botnet Hides Behind AutoIt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Andromeda Botnet Hides Behind AutoIt | McAfee Blog","description":"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Andromeda Botnet Hides Behind AutoIt | McAfee Blog","og_description":"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-09-12T23:02:00+00:00","article_modified_time":"2025-05-28T05:19:25+00:00","og_image":[{"width":1303,"height":583,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Andromeda Botnet Hides Behind AutoIt","datePublished":"2013-09-12T23:02:00+00:00","dateModified":"2025-05-28T05:19:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/"},"wordCount":929,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png","keywords":["botnet","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/","name":"Andromeda Botnet Hides Behind AutoIt | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png","datePublished":"2013-09-12T23:02:00+00:00","dateModified":"2025-05-28T05:19:25+00:00","description":"Last month, I posted a blog about an increase in the use of AutoIt scripts by malware authors to carry out malicious activities. Attackers have used","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/09\/anrdomeda_autoit_decode-300x134.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/andromeda-botnet-hides-behind-autoit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Andromeda Botnet Hides Behind AutoIt"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/29166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=29166"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/29166\/revisions"}],"predecessor-version":[{"id":214549,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/29166\/revisions\/214549"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=29166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=29166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=29166"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=29166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}