Threat Advisory

Golang-Powered Zergeca Botnet Executes High-Impact DDoS Attack

Threat: Malware
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY

Zergeca emerges as a sophisticated and multifaceted botnet, identified, and analysed by researcher. Zergeca presents itself as a notable threat due to its advanced capabilities and stealthy operational tactics. The botnet's initial propagation was observed through suspicious ELF files, utilizing a modified UPX packer and bearing characteristics reminiscent of the Golang programming language. Its deployment across multiple countries, including Russia and Germany. The botnet's operational strategy involves leveraging multiple DNS resolution methods, with a preference for DNS over HTTPS (DoH) to obfuscate its Command and Control (C2) communications.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY

Zergeca emerges as a sophisticated and multifaceted botnet, identified, and analysed by researcher. Zergeca presents itself as a notable threat due to its advanced capabilities and stealthy operational tactics. The botnet's initial propagation was observed through suspicious ELF files, utilizing a modified UPX packer and bearing characteristics reminiscent of the Golang programming language. Its deployment across multiple countries, including Russia and Germany. The botnet's operational strategy involves leveraging multiple DNS resolution methods, with a preference for DNS over HTTPS (DoH) to obfuscate its Command and Control (C2) communications.[emaillocker id="1283"]

Zergeca's technical architecture is notably robust, supporting a wide range of malicious activities beyond traditional DDoS attacks. Analysis reveals its modular design, which includes persistence mechanisms to ensure reinstallation on compromised devices and capabilities for proxying, scanning, self-upgrading, and reverse shell operations. The botnet employs XOR encryption extensively to protect sensitive strings, a technique identified through reverse engineering efforts using tools like IDAPro and custom IdaPython scripts. Moreover, Zergeca's C2 communication protocol utilizes the Smux library for encrypted multiplexing over TCP or KCP connections, enhancing its stealth and reliability.

Zergeca represents a significant cybersecurity threat due to its sophisticated design, evasive tactics, and continuous development by its creators. The botnet's ability to adapt, evade detection through frequent hash changes, and target diverse vulnerabilities such as Telnet weak passwords and known CVEs poses a formidable challenge to cybersecurity professionals and organizations globally. The operational complications of Zergeca are explained by the researcher's detailed analysis, which also highlights the value of proactive threat intelligence sharing within the cybersecurity community to successfully decrease its impact. Future encounters with Zergeca or its variants are anticipated, necessitating ongoing vigilance and robust defense strategies in the cybersecurity landscape.

THREAT PROFILE:

Tactics Technique Id Technique
Initial Access T1190 Exploit Public-Facing Application
Execution T1059 Command and Scripting Interpreter
Persistence T1547 Boot or Logon AutoStart Execution
Defense Evasion T1036 Masquerading
T1040 Network Sniffing
Discovery T1201 Password Policy Discovery
Command and Control T1090 Proxy
T1105 Ingress Tool Transfer
Exfiltration T1002 Data Compressed
Impact T1498 Network Denial of Service

REFERENCES:

The following reports contain further technical details:

https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html

[/emaillocker]
crossmenu