{"id":70304,"date":"2017-03-09T14:15:40","date_gmt":"2017-03-09T22:15:40","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=70304"},"modified":"2025-05-27T20:28:33","modified_gmt":"2025-05-28T03:28:33","slug":"analyzing-fresh-variant-dorkbot-botnet","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/","title":{"rendered":"Analyzing a Fresh Variant of the Dorkbot Botnet"},"content":{"rendered":"<p><em>This blog post was written by Sudhanshu Dubey.<\/em><\/p>\n<p>At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot, famous for its various capabilities including backdoor, password stealing, and other malicious behavior. Dorkbot relies on social networking as its infection vector. In this post, we offer our analysis of this new variant.<\/p>\n<p>The malware downloads the file from api[.]wipmania[.]net, a site that provides geolocalization services. The following screen shows the network traffic of the downloader file.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70308 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\" alt=\"\" width=\"1020\" height=\"441\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png 1020w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1-300x130.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1-768x332.png 768w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><\/a><\/p>\n<p><em>Downloader network communications.<\/em><\/p>\n<p>The downloaded file is a wrapper compiled using Microsoft Visual C\/C++ (2008 version). During our analysis we studied the wrapper file and extracted the inner file from the malware.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Analyzing the core <\/strong><\/h2>\n<p>The inner file is also complied with a Microsoft Visual C++. The core is 48KB and has strings related to virtual machine names, registry entries, encrypted URLs, etc. as shown in the following:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70309 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-2.png\" alt=\"\" width=\"658\" height=\"408\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-2.png 658w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-2-300x186.png 300w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\" \/><\/a><\/p>\n<p><em>Strings and encrypted URLs in the core file.<\/em><\/p>\n<h2><strong>Anti-VM<\/strong><\/h2>\n<p>Before performing any malicious activity, the malware executes code that checks for a virtual environment. It uses the SetupDiGetDeviceRegistryPropertyA() API, which helps in retrieving specified Universal Plug and Play device properties. A code snippet:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70310 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-3.png\" alt=\"\" width=\"956\" height=\"170\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-3.png 956w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-3-300x53.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-3-768x137.png 768w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/a><\/p>\n<p><em>Searching for virtual machines using SetupDiGetDeviceRegistryPropertyA ().<\/em><\/p>\n<p>As we see in the preceding snapshot, the malware passes the third argument as 0xC (SPDRP_FRIENDLYNAME), which retrieves the friendly name of the device. It then checks the device name with the strings related to virtual machines, for example, vbox, qemu, vmware, and virtual hd. If the malware finds any of these strings, indicating the presence of a virtual environment, it will terminate itself.<\/p>\n<p>After passing the VM check, the malware checks the current working directory. It compares the file path with the desired path from %appdata% with the folder name in GUID format, for example, %appdata%\/{GUID}. The following assembly code shows the malware code that checks the file path.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70311 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4.png\" alt=\"\" width=\"1060\" height=\"130\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4.png 1060w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4-300x37.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4-768x94.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-4-1024x126.png 1024w\" sizes=\"auto, (max-width: 1060px) 100vw, 1060px\" \/><\/a><\/p>\n<p><em>File execution path check.<\/em><\/p>\n<p>If the file is executed from a different path, the malware considers the event as its first execution. In the first execution, the malware sets up its environment: file drop, registry entries, etc. The malware creates a directory in %appdata% and copies itself. It uses a custom function and the StringFromGUID2() API to get the folder name in GUID format. The dropped file and path is shown in the following:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70312 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-5.png\" alt=\"\" width=\"714\" height=\"170\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-5.png 714w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-5-300x71.png 300w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/a><\/p>\n<p><em>The malware copies itself to %appdata%.<\/em><\/p>\n<p>Dorkbot also creates a Run registry entry and task to persist on the system, setting the execution file path with the dropped file mentioned above. The registry entry created by the malware:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70313 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-6.png\" alt=\"\" width=\"907\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-6.png 907w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-6-300x53.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-6-768x136.png 768w\" sizes=\"auto, (max-width: 907px) 100vw, 907px\" \/><\/a><\/p>\n<p><em>Dorkbot\u2019s registry entry.<\/em><\/p>\n<p>The malware also creates a task that triggers when the user logs on, executing the malware file.<\/p>\n<p>After successful installation of registry and schedule tasks, the malware uses process hollowing to execute its code as svchost.exe and bypass application-level whitelists.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70314 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-7.png\" alt=\"\" width=\"669\" height=\"45\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-7.png 669w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-7-300x20.png 300w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><\/a><\/p>\n<p><em>The malware creates svchost.exe.<\/em><\/p>\n<p>After injecting itself into svchost.exe, Dorkbot calls ZwQueueApcThread(),an undocumented API used to queue an asynchronous procedure call (APC) routine (the malware\u2019s remote code) on a current remote thread. (APCs are functions that execute asynchronously in the context of a particular thread.) ZwQueueApcThread allows the caller to specify three arguments that will be passed to the thread, including the thread routine. The malware sends a routine address different from the address of the entry point of the file, resulting in communication with the control server.<\/p>\n<p>The injected code first executes the relocation code, making the injected code compatible with the new base address. After relocating the code, the malware ensures it is kept active in the system\u2014even after being killed manually\u2014by injecting a watchdog code in already running processes. One strange thing we observed is that before injecting the watchdog code, the malware checks for the process names TeamViewer and tv_w32.exe. If the malware finds either of them, it does not inject its code into that process.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70315 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-8.png\" alt=\"\" width=\"666\" height=\"725\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-8.png 666w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-8-276x300.png 276w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-8-459x500.png 459w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/a><\/p>\n<p><em>Process enumeration and watchdog code injection.<\/em><\/p>\n<p>Dorkbot enumerates the running processes and tries to open them with 0x10047A flag\/permissions related to remote memory creation, reading and writing to memory. Definitions of the flags:<\/p>\n<p style=\"padding-left: 30px;\">0x100000\u00a0\u00a0\u00a0 =&gt; Synchronize<br \/>\n0x400\u00a0\u00a0\u00a0 \u00a0=&gt; QueryInformation<br \/>\n0x70\u00a0\u00a0 \u00a0\u00a0=&gt; VirtualMemoryRead + VirtualMemoryWrite + DuplicateHandle<br \/>\n0xA\u00a0\u00a0\u00a0 \u00a0=&gt; VirtualMemoryOperation + CreateThread<\/p>\n<p>The watchdog code has some API calls that Dorkbot needs to update to make its code compatible with the remote process. Dorkbot updates the placeholders in the code that are related to API addresses and the malware\u2019s process ID. Along with the watchdog code, the malware also inject its file path, referenced by the code, to restart the process. The following screen shows the watchdog code before and after modification:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70316 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9.png\" alt=\"\" width=\"1535\" height=\"308\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9.png 1535w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9-300x60.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9-768x154.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-9-1024x205.png 1024w\" sizes=\"auto, (max-width: 1535px) 100vw, 1535px\" \/><\/a><\/p>\n<p><em>Injected watchdog code: before and after modification.<\/em><\/p>\n<p>The injected code uses the WaitForSingleObject() API to wait infinitely for malware process. It provides the malware\u2019s process ID as the first argument and infinite time as the second argument. If the malware process is killed, Dorkbot signals to WaitForSingleObject () and the injected code proceeds. After getting the signal, the injected code executes CreateProcessW () API and again creates the malware process.<\/p>\n<p>As we mentioned, the malware also injects the malware\u2019s file path to the remote process to restart its execution if it is killed manually. But as we see in the preceding screen, we cannot find any address referencing the malware file path. This is because the malware passes the file path\u2019s address as an argument to the CreateRemoteThread() API and in the code is referenced with the help of the EBP register ([EBP + 8]).<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70317 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-10.png\" alt=\"\" width=\"938\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-10.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-10-300x83.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-10-768x211.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/a><\/p>\n<p><em>CreateRemoteThread arguments.<\/em><\/p>\n<h2><strong>Network communications<\/strong><\/h2>\n<p>For communications, the malware contains a list of encrypted URLs. The malware decrypts this list and generates a list of URLs in the format %s%u.%s, which is also present in the malware itself. Here the first \u201c%s\u201d signifies the string \u201ccon,\u201d \u201c%u\u201d signifies integers 1 and 2, and the subsequent \u201c%s\u201d signifies the decrypted URL. Thus the malware adds the prefixes con1. and con2. to each of the decrypted URLs.<\/p>\n<p style=\"padding-left: 30px;\">Decrypted URL: abcxyz.com<br \/>\nGenerated URLs: con1. abcxyz.com,\u00a0con2. abcxyz.com<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70318 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-11.png\" alt=\"\" width=\"592\" height=\"428\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-11.png 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-11-300x217.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/a><\/p>\n<p><em>Data sent by the malware to its control server.<\/em><\/p>\n<p>The first 4 bytes of the data is the fixed dword value hardcoded in the malware. These 4 bytes are also used while checking the received data from the server. The fifth byte of the data represents operating system major and minor versions. The sixth byte defines whether the OS is 32- or 64-bit. The value for this byte is either 0x20 or 0x40, the hex representations of 32 and 64, respectively.<\/p>\n<p>The next part is the hex data, defined as a character, for example, 0x41 stands for for \u201cA\u201d and is represented as 4 and 1. This part of the data is the union of the computer name and the calculated hash data separated by #. The malware uses the format specifier \u201c%s#%s,\u201d in which the first part is the computer name and the latter the hash value. Following this data is the word value (0x444E in this case), which is taken from the particular offset in the file. The last part of the data is derived from the current time and the output of the GetTickCount () API.<\/p>\n<p>After sending the data to the server, the malware is ready to receive data. Because the URLs are not currently active, we did not receive any data from the server during our analysis. However, from the assembly code, we can see that the malware expects the data from the server in a particular format. The following assembly code snippet shows the checks performed by the malware on the received data.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-70319 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-12.png\" alt=\"\" width=\"696\" height=\"196\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-12.png 696w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-12-300x84.png 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p><em>Received data checks.<\/em><\/p>\n<p>The WS2_32.recv () API receives data from a connected socket and returns the number of bytes received. The malware checks the return value of the API, which is the length of bytes received from server with the value 205; that is, the malware expects the data from control server to be 205 bytes in length. After checking the number of bytes, it evaluates the first 6 bytes of the data. It compares the first 4 bytes with the fixed dword value (18273645 in this case), which it used while sending the data. (See the screen of data sent to the control server.) The malware expects the fifth and sixth bytes to be 1 and 0, respectively.<\/p>\n<p>The inactive URLs prevented us from going further with our analysis. We shall post new information when available.<\/p>\n<p>McAfee products detect this variant of the malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[49,1814,338,180],"coauthors":[4136],"class_list":["post-70304","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-botnet","tag-computer-security","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-09T22:15:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:28:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1020\" \/>\n\t<meta property=\"og:image:height\" content=\"441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Analyzing a Fresh Variant of the Dorkbot Botnet\",\"datePublished\":\"2017-03-09T22:15:40+00:00\",\"dateModified\":\"2025-05-28T03:28:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\"},\"wordCount\":1400,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\",\"keywords\":[\"botnet\",\"computer security\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\",\"name\":\"Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\",\"datePublished\":\"2017-03-09T22:15:40+00:00\",\"dateModified\":\"2025-05-28T03:28:33+00:00\",\"description\":\"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Analyzing a Fresh Variant of the Dorkbot Botnet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog","description":"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog","og_description":"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-03-09T22:15:40+00:00","article_modified_time":"2025-05-28T03:28:33+00:00","og_image":[{"width":1020,"height":441,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Analyzing a Fresh Variant of the Dorkbot Botnet","datePublished":"2017-03-09T22:15:40+00:00","dateModified":"2025-05-28T03:28:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/"},"wordCount":1400,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png","keywords":["botnet","computer security","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/","name":"Analyzing a Fresh Variant of the Dorkbot Botnet | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png","datePublished":"2017-03-09T22:15:40+00:00","dateModified":"2025-05-28T03:28:33+00:00","description":"This blog post was written by Sudhanshu Dubey. At McAfee Labs, we have recently observed a new variant of the Dorkbot botnet. Dorkbot is a well-known bot,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/03\/2017-03-08-Dorkbot-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-fresh-variant-dorkbot-botnet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Analyzing a Fresh Variant of the Dorkbot Botnet"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=70304"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70304\/revisions"}],"predecessor-version":[{"id":214504,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70304\/revisions\/214504"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=70304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=70304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=70304"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=70304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}