So, today I grabbed a sample of the leaked “Zemra” botnet source code, and quickly did a “10 second analysis” of the webpanels source code. I often do this to see can I locate any “GLARING SECURITY FLAWS” in the C&C. I am also working on finding a google-dork to find Zemra installations.
For information about Zemra the following links are useful
So. This was on sale in various places online (Russian forums apparently), however I suspect (based on the backdoor and the fact it is written in C#) that is is German in origin. Some of the stuff in there seems to be German also, so I assume it is another product of the German Skid Scene. Basically “Rippers Inc”. LAME!
Anyway, I was looking at the webpanels source (I will eventually rip the bots source apart) and noticed that gate.php has some lulzy SQLi (possibly).
Far more interesting was the backdoor. Located at /Zemra/Panel/Zemra/system/command.php, it is your basic “BACKDOOR”. It takes the GET parameter “cmd” and executes it.
Example: localhost/Zemra/Panel/Zemra/system/command.php?cmd=cat /etc/passwd
I will be researching this in greater depth… Sometime in the near-ish future. But as always, there be backdoors in your backdoors!
Finally: Zemra.rar file is here: Zemra