Madness PRO DDoS

Madness PRO DDoS
(Type: Backdoor, DDoS)

[Google Translated] • Written in C++, easily crypt is lightweight (compressed sample < 15KB) • Full compatibility with all Windows family of NT (x86 and x64) • Boat has 7 types of attacks • Stability in the system. Indicators load on the CPU and RAM are very uniform • Do not attracted the attention of UAC and Windows Firewall • Able to establish port, referal and cookies individually for each goal • Supports up to 10 targets simultaneously • Has a very low load on the CPU with the new, complex system of parsing commands (all analogs parsing takes place inside a function in multiple threads - it's extra work load on the processor. New bot enters all data in the array before the attack on the function and come ready options address, port, referral, etc.) • Has an enormous power output of more than 1500 http (and more 30000 UDP) queries per minute through direct interaction with the network drivers, even on desktop Windows! (only using WinSock) is about 10 times more than some few analogs and more top (on this parameter) competitors. • In the control panel are: the number of requests per minute, right in the system, the version of the system. • Supports bypass CloudFlare protection (!) And many other more common. • Supports Slow GET and Slow POST modes! • In the packet header specifies disabling the cache (Cache-Control: no-cache), which increases the load on the server • The protection of dialogue bot panel spetsklyuchem

[News Analysis] Trends:

Total Trend: 0

Trend Per Year


Trend Per Month



[News Analysis] News Mention Another Threat Name:



[TTP Analysis] Technique Performance:



[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Tool: Madness PRO DDoS

Names: Madness PRO DDoS

Description: [Google Translated] • Written in C++, easily crypt is lightweight (compressed sample < 15KB) • Full compatibility with all Windows family of NT (x86 and x64) • Boat has 7 types of attacks • Stability in the system. Indicators load on the CPU and RAM are very uniform • Do not attracted the attention of UAC and Windows Firewall • Able to establish port, referal and cookies individually for each goal • Supports up to 10 targets simultaneously • Has a very low load on the CPU with the new, complex system of parsing commands (all analogs parsing takes place inside a function in multiple threads - it's extra work load on the processor. New bot enters all data in the array before the attack on the function and come ready options address, port, referral, etc.) • Has an enormous power output of more than 1500 http (and more 30000 UDP) queries per minute through direct interaction with the network drivers, even on desktop Windows! (only using WinSock) is about 10 times more than some few analogs and more top (on this parameter) competitors. • In the control panel are: the number of requests per minute, right in the system, the version of the system. • Supports bypass CloudFlare protection (!) And many other more common. • Supports Slow GET and Slow POST modes! • In the packet header specifies disabling the cache (Cache-Control: no-cache), which increases the load on the server • The protection of dialogue bot panel spetsklyuchem

Category: Malware

Type: Backdoor, DDoS

Information: https://malware.dontneedcoffee.com/2013/10/meet-madness-pro-or-few-days-rise-of.html

Last-card-change: 2020-04-20

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact