Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation to disguise its actions, malware is getting more complex and sneaky.
Additionally, to infiltrate systems and avoid detection by traditional security measures, malware increasingly leverages social engineering and advanced delivery methods, like-
Recently, cybersecurity researchers at Any.Run has examined a Node.js-based Lu0Bot malware sample that completely takes over the victim’s computer system.
Researchers were intrigued by Node.js malware, initially thought to be a basic DDOS bot but revealed as more complex. Node.js targets a versatile runtime environment used in modern web apps.
Since this malware utilizing JavaScript employs multi-layer obfuscation techniques, that’s why it poses a distinctive detection challenge.
Lu0bot emerged in February 2021 as a GCleaner second-stage payload, functioning as a bot that awaits commands from a C2 server and sends encrypted system data.
The bot’s activity is modest, with 5-8 new monthly samples on dark marketplaces.
As of now, only one new sample was uploaded in August, but there may be more dormant ones awaiting C2 commands, though this is speculative.
Despite limited activity, Lu0bot’s creative Node.js design sets it apart, with its capabilities bounded only by the language itself.
Due to the bot’s IP address issue, the security analysts were unable to find a live sample. However, a public sample connected, triggering:-
Researchers quickly detected an SFX packer in the file, which acts as a self-extracting archive that is openable with any utility.
While besides this, the archive contains a BAT file and more:-
The static analysis highlights the following things:-
This malware stands out in how it constructs its domain, assembling it from parts in the JS code.
Security researchers received a JavaScript code that’s deeply obfuscated and unreadable.
Researchers confirmed code readability after removing excess bytes and applying a JavaScript deobfuscator, resulting in this transformation:
The code begins with an encrypted string array which:-
Here below, we have mentioned all the capabilities of Lu0Bot malware:-
If Lu0bot’s campaign scales and the server becomes active, its distinctive use of NODE JS makes it an intriguing analysis subject with potential risks.
Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.
GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has issued…
In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches, and…
Google has rolled out a critical update for its Chrome browser, addressing a high-severity vulnerability…
Microsoft has disclosed an active exploitation of a zero-day vulnerability in the Windows Common Log…
Elastic, the company behind Kibana, has released critical security updates to address a high-severity vulnerability…
A recently discovered vulnerability in the AWS Systems Manager (SSM) Agent, a cornerstone of Amazon…