A case study of the rustock rootkit and spam bot

  • Authors:
  • Ken Chiang;Levi Lloyd

  • Affiliations:
  • Sandia National Laboratories, Livermore, CA;Sandia National Laboratories, Livermore, CA

  • Venue:
  • HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present a case study of the steps leading up to the extraction of the spam bot payload found within a backdoor rootkit known as Backdoor.Rustock.B or Spam-Mailbot.c. Following the extraction of the spam module we focus our analysis on the steps necessary to decrypt the communications between the command and control server and infected hosts. Part of the discussion involves a method to extract the encryption key from within the malware binary and use that to decrypt the communications. The result is a better understanding of an advanced botnet communications scheme.