Found botnet C2C, what to do next?
by br4xx - Wednesday December 6, 2023 at 05:30 PM
#1
Hi every1,
Today, I found a C2C server for russia-backed "voluntary" botnet called DDoSia. But I don't know what to do next. Server is hosted in Latvia. Any idea what to do next? I'm unable to breach into the server, so now willing to share IP address with screenshot from Ghidra to prove I indeed did find the C2C server - Shoot me a pm
Reply
#2
Share the IP!
Reply
#3
What was your initial goal? Follow that.
Crypt files/Crypt files .NET [x64/x86] Native x86 WinDef Bypass - 0/26:
https://breachforums.st/Thread-MALWARE-C...26-Avcheck


Reply
#4
(Dec 06, 2023, 05:34 PM)N1k7 Wrote: What was your initial goal? Follow that.

tbh, I was trying to take it down or take control over this, but without any success. So I'm willing to give everyone a try and maybe someone figures it out - I wasn't able to. But I would be really happy if someone figures it out and shares it with me so I can learn something new.
Reply
#5
(Dec 06, 2023, 05:39 PM)br4xx Wrote:
(Dec 06, 2023, 05:34 PM)N1k7 Wrote: What was your initial goal? Follow that.

tbh, I was trying to take it down or take control over this, but without any success. So I'm willing to give everyone a try and maybe someone figures it out - I wasn't able to. But I would be really happy if someone figures it out and shares it with me so I can learn something new.

I see.

(Dec 06, 2023, 05:39 PM)br4xx Wrote:
(Dec 06, 2023, 05:34 PM)N1k7 Wrote: What was your initial goal? Follow that.

tbh, I was trying to take it down or take control over this, but without any success. So I'm willing to give everyone a try and maybe someone figures it out - I wasn't able to. But I would be really happy if someone figures it out and shares it with me so I can learn something new.

Hello,

I can't help with the project that you're working on right now. Due to being a pro-russian person myself. There's also this small probability of them having a vulnerability on their ddosia c2 server as it should be guarded with maximum security.

Because the ddosia project as I've seen is very public and the volunteers can easily download the Go lang binaries and contribute their band width as they would like. The C2 you've found by reversing the binary would already be found by security reseachers if they tried and fear not. People are trying to make the C2 go offline, not regular people but Law Enforcement.

~ peace out
Crypt files/Crypt files .NET [x64/x86] Native x86 WinDef Bypass - 0/26:
https://breachforums.st/Thread-MALWARE-C...26-Avcheck


Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  STOP PAYING FOR CAPTCHA SERVICES!!! UNLIMITED CAPTCHA SOLVER TUTORIAL HASBULLA 87 14,297 1 hour ago
Last Post: zedfghjytgfvbhgfvc
  WormGPT? D3N1S 259 41,535 5 hours ago
Last Post: vx3n
  DarkGPT Tutorial Easy idontknowmyname 187 8,154 Yesterday, 01:46 PM
Last Post: Breacher_Lokidas
  0day-Mari Bot Godfather1 77 7,365 Yesterday, 09:30 AM
Last Post: Diezxx
  [2026] Bypass AV / EDR Spearr 63 1,319 May 07, 2026, 07:19 PM
Last Post: AKASHIC

Forum Jump:


 Users browsing this forum: 1 Guest(s)