{"id":5063,"date":"2010-09-20T05:02:49","date_gmt":"2010-09-20T13:02:49","guid":{"rendered":"http:\/\/www.labs.com\/research\/blog\/?p=5063"},"modified":"2024-02-20T20:15:20","modified_gmt":"2024-02-21T04:15:20","slug":"zeus-crimeware-toolkit","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/","title":{"rendered":"Zeus Crimeware Toolkit"},"content":{"rendered":"<p>The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of stealing personal information&#8211;by infecting users&#8217; computers and capturing all the information entered on banking sites. Apart from stealing passwords, this bot has variety of methods implemented for stealing identities and controlling victims&#8217; computers.<\/p>\n<p>Over the years Zeus has been released in a lot of versions, adding or changing functionality, and is highly flexible in its configuration. So this is just a snapshot of one version (1.2.7.19), giving an overview of its functionality.<\/p>\n<p>In the first part of this blog I will disclose the process involved in building and distributing a Zeus botnet in the wild. In the second part, I will discuss how Zeus captures personal information by injecting code dynamically, and finally I&#8217;ll offer some thoughts on command and control.<\/p>\n<p>Zeus serves as a heads up for all those who believe that banking transactions on HTTPS can never be intercepted.<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Zeus builder toolkit<\/span><\/strong><\/h2>\n<p>I\u2019ve been busy researching how Zeus is built and distributed in the wild. It has been a pretty high-profile botnet since it was discovered, due to its high rate of infections. During our research activity I was able to get hold of a Zeus builder toolkit. It was priced at US$700 to $1,500 then; a few months later, a free version of this toolkit was public.<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Building and Configuring Zeus Bot<\/span><\/strong><\/h2>\n<p>The process of building and configuring the Zeus bot requires just a couple of steps.<\/p>\n<p style=\"text-align: justify;\">Step 1) \u00c2\u00a0Configuration specification:<\/p>\n<p style=\"text-align: justify;\">Specifying all the static configuration parameters in the configuration file.<\/p>\n<p>The \u201cedit config\u201d\u009d button will allow you to enter various parameters to control the botnet as \u00c2\u00a0described below.<\/p>\n<p><span style=\"color: #0000ff;\"><em><span style=\"color: #000000;\">timer_logs <\/span><\/em><span style=\"color: #000000;\">:<\/span> <span style=\"color: #000000;\">Time interval to upload the logs to server<br \/>\n<\/span><em><span style=\"color: #000000;\">timer_stats <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0Time interval to upload infection statistics to server<br \/>\n<\/span><em><span style=\"color: #000000;\">url_config <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0Server URL for fetching the config file<br \/>\n<\/span><em><span style=\"color: #000000;\">url_compip<\/span><\/em><span style=\"color: #000000;\"> :\u00c2\u00a0Server URL for reporting the victim<br \/>\n<\/span><em><span style=\"color: #000000;\">encryption_key<\/span><\/em><span style=\"color: #000000;\"> :\u00c2\u00a0Encryption key to encrypt config file<br \/>\n<\/span><em><span style=\"color: #000000;\">url_loader <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0URL for fetching latest version of the zeus.exe<br \/>\n<\/span><em><span style=\"color: #000000;\">url_server <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0Command and control server<br \/>\n<\/span><em><span style=\"color: #000000;\">file_webinjects<\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0This parameter is the file name containing HTML web injection code.<br \/>\n<\/span><em><span style=\"color: #000000;\">AdvancedConfigs <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0URL for fetching the backup config file<br \/>\n<\/span><em><span style=\"color: #000000;\">WebFilters <\/span><\/em><span style=\"color: #000000;\">:\u00c2\u00a0Contains the masked list of URLs that should be monitored for capturing login\u00c2\u00a0credentials.<br \/>\n<\/span><em><span style=\"color: #000000;\">WebDataFilters<\/span><\/em><span style=\"color: #000000;\">: Contains the list of URLs that should be monitored for specific string matches. If patterns such as &#8220;Passw&#8221; or &#8220;login&#8221; is matched, data is captured and sent to C&amp;C server, e.g.,\u00c2\u00a0http:\/\/mail.rambler.ru\/*&#8221; &#8220;passw;login&#8221;<br \/>\n<\/span><em><span style=\"color: #000000;\">WebFakes<\/span><\/em><span style=\"color: #000000;\">: URLs that should be redirected to the fake websites<\/span><\/span><\/p>\n<p><em>TANGrabber:<\/em><\/p>\n<div>\n<div>TAN (Transaction Authentication Number) Grabber is a Zeus feature that allows the bot master to specify the banking sites to monitor and the specific patters to search for in the transaction data posted to the bank websites. Zeus will match these specified data patterns, capture them, and post them on the C&amp;C server. The Bot master can enter other banking sites here and Zeus will add them in the final encrypted configuration file when the \u201cBuild config&#8221; button is clicked.<\/div>\n<div>I entered the fake banking URL in the config file below, marked in <span style=\"letter-spacing: 0.2pt;\"><span style=\"color: #ff0000;\">Red, <\/span><\/span>just to check its presence when the encrypted configuration file is built.<\/div>\n<\/div>\n<p>Step 2) Building an encrypted configuration file<\/p>\n<p>Let\u2019s have a look what happens when we press the \u201cBuild config\u201d\u009d button. The toolkit will build the final encrypted configuration file with an option to save it. This configuration file is then uploaded by the bot master on the C&amp;C server.<\/p>\n<p>Step 3) Building the bot executable<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The bot master can build the Zeus executable with the \u201cBuild loader\u201d\u009d button option.<\/p>\n<p>Zeus Network Communications<\/p>\n<p>When the bot is executed in a virtual machine, initially it communicates over HTTP and sends a GET request to the command and control server to retrieve the configuration file. The server replies with the requested configuration file. This request is made repeatedly on the basis of the timer value configured in the configuration file.<\/p>\n<p>The bot sends the information of the infected computer to the control server according to the \u201curl_server\u201d\u009d parameter specified in the configuration file.<\/p>\n<h2><strong>One interesting observation<\/strong><\/h2>\n<p>Upon closer analysis of the Zeus network communications, we have come across an interesting similarity between the GET response from the server and the next POST request sent by the bot.<\/p>\n<p>As observed above, we see this similarity in the initial part of the GET response from the server and the POST request from the bot, starting at the third byte after the HTTP header ends. We have made similar observations with the older versions of the Zeus bot. This consistent trait is something we can use to implement generic detection for this bot on a network gateway!<\/p>\n<p><strong><span style=\"text-decoration: underline;\">HTML injection on SSL-secured banking transactions<\/span><\/strong><\/p>\n<p>As banking websites evolved, they have added an extra layer of security to mitigate keystroke-logging attacks. On the other hand, continuously evolving malwares have also come out with new techniques to bypass these security measures and steal login credentials. Password-stealing botnets such as Zeus now use HTML code-injection techniques, whereby a bot on the infected computer injects HTML code into the legitimate web pages of the banking site to request additional personal information not required during the transactions. This lures the users into inputting more credentials than required. They are captured by the bot and posted to the Zeus bot masters command and control server.<\/p>\n<p>This shows even forms that are supposed to be HTTPS encrypted can be manipulated by a bot to entice the user into typing arbitrary amounts of personal information, which can be captured (using key logging) and sent off to the C&amp;C master.<\/p>\n<h2><strong>Heuristic detection for web injection<\/strong> <strong>activity<\/strong>:<\/h2>\n<p>Another technique that can be used is detecting the difference in the HTML form fields.\u00c2\u00a0 The idea is to detect the change in the number of HTML form fields while accessing the banking site and when the data is posted on the server. This can be detected on the Network gateway. In the case of Zeus, as the banking sites are accessed over HTTPS, the perimeter device needs to be armed with SSL man-in-the-middle functionality to detect this form of network traffic.<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Intercepting mouse clicks and capturing virtual keyboard screenshots<\/span><\/strong><\/h2>\n<p>Banking websites have come up with the virtual keyboard technique to mitigate the keystroke-logging attacks. Zeus counterattacks this security feature by capturing the screenshots on each mouse click. Each click will be intercepted and a screenshot captured that will be sent to the drop server which is then combined sequentially to extract the entered password as shown below.<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Analysis of the decrypted configuration file<\/span><\/strong><\/h2>\n<p>Once a machine is infected with the Zeus bot, you can use the Zeus decoder tool available <a href=\"https:\/\/www.threatexpert.com\/blog\/Zbot\/ZeusDecoder.zip\">here<\/a> to decrypt the encrypted config file.<\/p>\n<p>Let\u2018s take a look at the decrypted config file. We see the HTML injection code that this bot has added into it.<\/p>\n<p class=\"MsoNormalCxSpFirst\" style=\"text-align: justify;\">http:\/\/172.16.230.183\/bt.exe<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">http:\/\/172.16.230.183\/gate.php<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">!*.microsoft.com\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">!http:\/\/*myspace.com*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">https:\/\/www.gruposantander.es\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">!http:\/\/*odnoklassniki.ru\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">!http:\/\/vkontakte.ru\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">@*\/login.osmp.ru\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">@*\/atl.osmp.ru\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">https:\/\/banking.*.de\/cgi\/ueberweisung.cgi\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">*&amp;tid=*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">*&amp;betrag=*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">https:\/\/internetbanking.gad.de\/banking\/*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">KktNrTanEnz<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">https:\/\/www.citibank.de\/*\/jba\/mp#\/SubmitRecap.do<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">SYNC_TOKEN=*<\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"margin-left: 3.5in; text-align: justify; text-indent: -3.5in;\"><span style=\"color: #ff0000;\">https:\/\/www.mybank.com\/loginform<span style=\"color: #ff0000;\">.as<\/span><\/span><span style=\"color: #ff0000;\">p<\/span><\/p>\n<p class=\"MsoNormalCxSpMiddle\" style=\"margin-left: 3.5in; text-align: justify; text-indent: -3.5in;\">(Fake banking URL that I added while building the config file.)<\/p>\n<h2><strong>HTML injection code in the config file:<\/strong><\/h2>\n<p>Following is the abbreviated list of banking sites targeted by this bot; it&#8217;s found in the decrypted configuration file.<\/p>\n<p>https:\/\/online.wellsfargo.com\/signon*<\/p>\n<p>https:\/\/www.paypal.com\/*\/webscr?cmd=_account<\/p>\n<p>https:\/\/www.paypal.com\/*\/webscr?cmd=_login-done*<\/p>\n<p>https:\/\/www#.usbank.com\/internetBanking\/LoginRouter<\/p>\n<p>https:\/\/easyweb*.tdcanadatrust.com\/servlet\/*FinancialSummaryServlet*<\/p>\n<p>https:\/\/www#.citizensbankonline.com\/*\/index-wait.jsp<\/p>\n<p>https:\/\/onlinebanking.nationalcity.com\/OLB\/secure\/AccountList.aspx<\/p>\n<p>https:\/\/www.suntrust.com\/portal\/server.pt*parentname=Login*<\/p>\n<p>https:\/\/www.53.com\/servlet\/efsonline\/index.html*<\/p>\n<p>https:\/\/web.da-us.citibank.com\/*BS_Id=MemberHomepage*<\/p>\n<p>https:\/\/onlineeast#.bankofamerica.com\/cgi-bin\/ias\/*\/GotoWelcome<\/p>\n<p>https:\/\/online.wamu.com\/Servicing\/Servicing.aspx?targetPage=AccountSummary<\/p>\n<p>https:\/\/onlinebanking#.wachovia.com\/myAccounts.aspx?referrer=authService<\/p>\n<p>https:\/\/resources.chase.com\/MyAccounts.aspx<\/p>\n<p>https:\/\/bancaonline.openbank.es\/servlet\/PProxy?*<\/p>\n<p>https:\/\/extranet.banesto.es\/*\/loginParticulares.htm<\/p>\n<p>https:\/\/banesnet.banesto.es\/*\/loginEmpresas.htm<\/p>\n<p>https:\/\/empresas.gruposantander.es\/WebEmpresas\/servlet\/webempresas.servlets.*<\/p>\n<p>https:\/\/www.gruposantander.es\/bog\/sbi*?ptns=acceso*<\/p>\n<p>https:\/\/www.bbvanetoffice.com\/local_bdno\/login_bbvanetoffice.html<\/p>\n<p>https:\/\/www.bancajaproximaempresas.com\/ControlEmpresas*<\/p>\n<p>https:\/\/www.citibank.de*<\/p>\n<p>https:\/\/probanking.procreditbank.bg\/main\/main.asp*<\/p>\n<p>https:\/\/ibank.internationalbanking.barclays.com\/logon\/icebapplication*<\/p>\n<p>https:\/\/ibank.barclays.co.uk\/olb\/x\/LoginMember.do<\/p>\n<p>https:\/\/online-offshore.lloydstsb.com\/customer.ibc<\/p>\n<p>https:\/\/online-business.lloydstsb.co.uk\/customer.ibc<\/p>\n<p>https:\/\/www.dab-bank.com*<\/p>\n<p>http:\/\/www.hsbc.co.uk\/1\/2\/personal\/internet-banking*<\/p>\n<p>https:\/\/www.nwolb.com\/Login.aspx*<\/p>\n<p>https:\/\/home.ybonline.co.uk\/login.html*<\/p>\n<p>https:\/\/home.cbonline.co.uk\/login.html*<\/p>\n<p>https:\/\/welcome27.co-operativebank.co.uk\/CBIBSWeb\/start.do<\/p>\n<p>https:\/\/welcome23.smile.co.uk\/SmileWeb\/start.do<\/p>\n<p>https:\/\/www.halifax-online.co.uk\/_mem_bin\/formslogin.asp*<\/p>\n<div>\n<p>https:\/\/www2.bancopopular.es\/AppBPE\/servlet\/servin*<\/p>\n<p>https:\/\/www.bancoherrero.com\/es\/*<\/p>\n<p>https:\/\/pastornetparticulares.bancopastor.es\/SrPd*<\/p>\n<p>https:\/\/intelvia.cajamurcia.es\/2043\/entrada\/01entradaencrip.htm<\/p>\n<p>https:\/\/www.caja-granada.es\/cgi-bin\/INclient_2031<\/p>\n<p>https:\/\/www.fibancmediolanum.es\/BasePage.aspx*<\/p>\n<p>https:\/\/carnet.cajarioja.es\/banca3\/tx0011\/0011.jsp<\/p>\n<p>https:\/\/www.cajalaboral.com\/home\/acceso.asp<\/p>\n<p>https:\/\/www.cajasoldirecto.es\/2106\/*<\/p>\n<p>https:\/\/www.clavenet.net\/cgi-bin\/INclient_7054<\/p>\n<p>https:\/\/www.cajavital.es\/Appserver\/vitalnet*<\/p>\n<p>https:\/\/banca.cajaen.es\/Jaen\/INclient.jsp<\/p>\n<p>https:\/\/www.cajadeavila.es\/cgi-bin\/INclient_6094<\/p>\n<p>https:\/\/www.caixatarragona.es\/esp\/sec_1\/oficinacodigo.jsp<\/p>\n<p>http:\/\/caixasabadell.net\/banca2\/tx0011\/0011.jsp<\/p>\n<p>https:\/\/www.caixaontinyent.es\/cgi-bin\/INclient_2045<\/p>\n<p>https:\/\/www.caixalaietana.es\/cgi-bin\/INclient_2042<\/p>\n<p>https:\/\/www.cajacirculo.es\/ISMC\/Circulo\/acceso.jsp<\/p>\n<p>https:\/\/areasegura.banif.es\/bog\/bogbsn*<\/p>\n<p>https:\/\/www.bgnetplus.com\/niloinet\/login.jsp<\/p>\n<p>https:\/\/www.caixagirona.es\/cgi-bin\/INclient_2030*<\/p>\n<p>https:\/\/www.unicaja.es\/PortalServlet*<\/p>\n<p>https:\/\/www.sabadellatlantico.com\/es\/*<\/p>\n<p>https:\/\/oi.cajamadrid.es\/CajaMadrid\/oi\/pt_oi\/Login\/login<\/p>\n<p>https:\/\/www.cajabadajoz.es\/cgi-bin\/INclient_6010*<\/p>\n<p>https:\/\/extranet.banesto.es\/npage\/OtrosLogin\/LoginIBanesto.htm<\/p>\n<p>https:\/\/montevia.elmonte.es\/cgi-bin\/INclient_2098*<\/p>\n<p>https:\/\/www.cajacanarias.es\/cgi-bin\/INclient_6065<\/p>\n<p>https:\/\/oie.cajamadridempresas.es\/CajaMadrid\/oie\/pt_oie\/Login\/login_oie_1<\/p>\n<p>https:\/\/www.gruppocarige.it\/grps\/vbank\/jsp\/login.jsp<\/p>\n<p>https:\/\/bancopostaonline.poste.it\/bpol\/bancoposta\/formslogin.asp<\/p>\n<p>https:\/\/privati.internetbanking.bancaintesa.it\/sm\/login\/IN\/box_login.jsp<\/p>\n<p>https:\/\/hb.quiubi.it\/newSSO\/x11logon.htm<\/p>\n<p>https:\/\/www.iwbank.it\/private\/index_pub.jhtml*<\/p>\n<p>https:\/\/web.secservizi.it\/siteminderagent\/forms\/login.fcc<\/p>\n<p>https:\/\/www.isideonline.it\/relaxbanking\/sso.Login*<\/p>\n<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Botnet Command and Control<\/strong><\/span><\/div>\n<p>This toolkit comes with a control panel installation that is typically used to track the botnet infections. This is a PHP application that can be run on a web server along with the other required database software (MYSQL). It also enables the attacker to remotely control and send commands to the victims&#8217; computers.<\/p>\n<p>I opened one of the scripts that came with this toolkit and I found the bot can be given the following commands:<\/p>\n<p>$_COMMANDS_LIST = array<\/p>\n<p>(<\/p>\n<p><span style=\"color: #000080;\"><span style=\"color: #0000ff;\">&#8216;reboo<\/span><span style=\"color: #0000ff;\">t<\/span>&#8216;<\/span> =&gt; &#8216;Reboot computer.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;<\/span><span style=\"color: #0000ff;\">kos<\/span><span style=\"color: #0000ff;\">&#8216; <\/span>=&gt; &#8216;Kill OS.&#8217;,<\/p>\n<p>&#8216;<span style=\"color: #0000ff;\">shutdown<\/span>&#8216; =&gt;\u00c2\u00a0 &#8216;Shutdown computer.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;bc_add [service] [ip] [port]<\/span>&#8216; =&gt; &#8216;Add backconnect for [service] using server witn address [ip]:[port].&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;bc_del [service] [ip] [port]&#8217; <\/span>=&gt; &#8216;Remove backconnect for [service] (mask is allowed) that use connection to [ip]:[port] (mask is allowed).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;block_url [url]<\/span>&#8216;\u00c2\u00a0\u00c2\u00a0 =&gt; &#8216;Disable access to [url] (mask is allowed).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;unblock_url [url]&#8217;<\/span> =&gt; &#8216;Enable access to [url] (mask is allowed).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;block_fake [url]<\/span>&#8216;\u00c2\u00a0\u00c2\u00a0 =&gt; &#8216;Disable executing of HTTP-fake\/inject with mask [url] (mask is allowed).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;unblock_fake [url]<\/span>&#8216; =&gt; &#8216;Enable executing of HTTP-fake\/inject with mask [url] (mask is allowed).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;rexec [url] [args]<\/span>&#8216;\u00c2\u00a0\u00c2\u00a0 =&gt; &#8216;Download and execute the file [url] with the arguments [args] (optional).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;rexeci [url] [args]&#8217; <\/span>=&gt; &#8216;Download and execute the file [url] with the arguments [args] (optional) using interactive user.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;lexec [file] [args]&#8217;<\/span> =&gt; &#8216;Execute the local file [file] with the arguments [args] (optional).&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;lexeci [file] [args]<\/span>&#8216; =&gt; &#8216;Execute the local file [file] with the arguments [args] (optional) using interactive user.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;addsf [file_mask&#8230;]&#8217;<\/span> =&gt; &#8216;Add file masks [file_mask] for local search.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;delsf [file_mask&#8230;]&#8217; <\/span>=&gt; &#8216;Remove file masks [file_mask] from local search.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;getfile [path]&#8217;<\/span> =&gt; &#8216;Upload file or folder [path] to server.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;getcerts&#8217;<\/span> =&gt; &#8216;Upload certificates from all stores to server.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;resetgrab&#8217; <\/span>=&gt; &#8216;Upload to server the information from the protected storage, cookies, etc.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;upcfg [url]&#8217; <\/span>=&gt; &#8216;Update configuration file from url [url] (optional, by default used standard url)&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;rename_bot [name]<\/span>&#8216; =&gt; &#8216;Rename bot to [name].&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;getmff&#8217; <\/span>=&gt; &#8216;Upload Macromedia Flash files to server.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;delmff&#8217; <\/span>=&gt; &#8216;Remove Macromedia Flash files.&#8217;,<\/p>\n<p><span style=\"color: #0000ff;\">&#8216;sethomepage [url]&#8217; <\/span>=&gt; &#8216;Set homepage [url] for Internet Explorer.&#8217;<\/p>\n<p>We found an interesting feature of this toolkit during the botnet building process: If the bot master accidently infects his own computer, he can remove the botnet with the \u201cRemove spyware from this system\u201d\u009d button. Too bad that command isn&#8217;t available to Zeus&#8217; victims.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This&#8230;<\/p>\n","protected":false},"author":1088,"featured_media":102265,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[786],"class_list":["post-5063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zeus Crimeware Toolkit | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zeus Crimeware Toolkit | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2010-09-20T13:02:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-21T04:15:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chintan Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chintan Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\"},\"author\":{\"name\":\"Chintan Shah\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/48a67aca4e443a833854424927b55569\"},\"headline\":\"Zeus Crimeware Toolkit\",\"datePublished\":\"2010-09-20T13:02:49+00:00\",\"dateModified\":\"2024-02-21T04:15:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\"},\"wordCount\":2151,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\",\"name\":\"Zeus Crimeware Toolkit | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg\",\"datePublished\":\"2010-09-20T13:02:49+00:00\",\"dateModified\":\"2024-02-21T04:15:20+00:00\",\"description\":\"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg\",\"width\":659,\"height\":500,\"caption\":\"virus scan\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zeus Crimeware Toolkit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/48a67aca4e443a833854424927b55569\",\"name\":\"Chintan Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4bd41c8738b3a7e04f993101170b3377\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Chintan-Shah-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Chintan-Shah-96x96.jpg\",\"caption\":\"Chintan Shah\"},\"description\":\"Chintan Shah is currently working as a Security Researcher with McAfee Intrusion Prevention System team and holds broad experience in the network security industry. He primarily focuses on Exploit and vulnerability research, building Threat Intelligence frameworks, Reverse engineering techniques and malware analysis. Chintan had researched and uncovered multiple targeted and espionage attacks in the past blogging about them. His interests lies in software fuzzing for vulnerability discovery, analyzing exploits, malwares and translating to product improvement.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/chintan-shah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zeus Crimeware Toolkit | McAfee Blog","description":"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Zeus Crimeware Toolkit | McAfee Blog","og_description":"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2010-09-20T13:02:49+00:00","article_modified_time":"2024-02-21T04:15:20+00:00","og_image":[{"width":659,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg","type":"image\/jpeg"}],"author":"Chintan Shah","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Chintan Shah","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/"},"author":{"name":"Chintan Shah","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/48a67aca4e443a833854424927b55569"},"headline":"Zeus Crimeware Toolkit","datePublished":"2010-09-20T13:02:49+00:00","dateModified":"2024-02-21T04:15:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/"},"wordCount":2151,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/","name":"Zeus Crimeware Toolkit | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg","datePublished":"2010-09-20T13:02:49+00:00","dateModified":"2024-02-21T04:15:20+00:00","description":"The Zeus botnet has been in the wild since 2007 and it is among the top botnets active today. This bot has an amazing and rarely observed means of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/06\/Glass-focused-on-virus-in-digital-code-illustration-659x500-1.jpg","width":659,"height":500,"caption":"virus scan"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/zeus-crimeware-toolkit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Zeus Crimeware Toolkit"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/48a67aca4e443a833854424927b55569","name":"Chintan Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4bd41c8738b3a7e04f993101170b3377","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Chintan-Shah-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Chintan-Shah-96x96.jpg","caption":"Chintan Shah"},"description":"Chintan Shah is currently working as a Security Researcher with McAfee Intrusion Prevention System team and holds broad experience in the network security industry. He primarily focuses on Exploit and vulnerability research, building Threat Intelligence frameworks, Reverse engineering techniques and malware analysis. Chintan had researched and uncovered multiple targeted and espionage attacks in the past blogging about them. His interests lies in software fuzzing for vulnerability discovery, analyzing exploits, malwares and translating to product improvement.","url":"https:\/\/www.mcafee.com\/blogs\/author\/chintan-shah\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/5063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1088"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=5063"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/5063\/revisions"}],"predecessor-version":[{"id":183401,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/5063\/revisions\/183401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/102265"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=5063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=5063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=5063"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=5063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}