SYMBOLCOMMON_NAMEaka. SYNONYMS
win.billgates (Back to overview)

BillGates


BillGates is a modularized malware, of supposedly Chinese origin. Its main functionality is to perform DDoS attacks, with support for DNS amplification. Often, BillGates is delivered with one or many backdoor modules.

BillGates is available for *nix-based systems as well as for Windows.

On Windows, the (Bill)Gates installer typically contains the various modules as linked resources.

References
2022-03-02Bleeping ComputerBill Toulas
@online{toulas:20220302:log4shell:fa4dfeb, author = {Bill Toulas}, title = {{Log4shell exploits now used mostly for DDoS botnets, cryptominers}}, date = {2022-03-02}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/log4shell-exploits-now-used-mostly-for-ddos-botnets-cryptominers/}, language = {English}, urldate = {2022-03-07} } Log4shell exploits now used mostly for DDoS botnets, cryptominers
Kinsing Tsunami BillGates
2021-10-22FortinetCara Lin
@online{lin:20211022:recent:248c7d4, author = {Cara Lin}, title = {{Recent Attack Uses Vulnerability on Confluence Server}}, date = {2021-10-22}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/recent-attack-uses-vulnerability-on-confluence-server}, language = {English}, urldate = {2021-10-26} } Recent Attack Uses Vulnerability on Confluence Server
Tsunami BillGates
2017-12-03Blaze's Security BlogBartBlaze
@online{bartblaze:20171203:notes:53a752f, author = {BartBlaze}, title = {{Notes on Linux/BillGates}}, date = {2017-12-03}, organization = {Blaze's Security Blog}, url = {https://bartblaze.blogspot.com/2017/12/notes-on-linuxbillgates.html}, language = {English}, urldate = {2020-01-13} } Notes on Linux/BillGates
BillGates
2016-04-04AkamaiAkamai
@techreport{akamai:20160404:threat:14239df, author = {Akamai}, title = {{Threat Advisory: “BillGates” Botnet}}, date = {2016-04-04}, institution = {Akamai}, url = {https://www.akamai.com/kr/ko/multimedia/documents/state-of-the-internet/bill-gates-botnet-threat-advisory.pdf}, language = {English}, urldate = {2020-01-07} } Threat Advisory: “BillGates” Botnet
BillGates
2015-09-30ThisIsSecurityBenoît Ancel
@online{ancel:20150930:when:ed6915f, author = {Benoît Ancel}, title = {{When ELF.BillGates met Windows}}, date = {2015-09-30}, organization = {ThisIsSecurity}, url = {https://thisissecurity.stormshield.com/2015/09/30/when-elf-billgates-met-windows/}, language = {English}, urldate = {2020-01-13} } When ELF.BillGates met Windows
BillGates
2014-07-10Kaspersky LabsMikhail Kuzin
@online{kuzin:20140710:versatile:0c64d25, author = {Mikhail Kuzin}, title = {{Versatile DDoS Trojan for Linux}}, date = {2014-07-10}, organization = {Kaspersky Labs}, url = {https://securelist.com/versatile-ddos-trojan-for-linux/64361/}, language = {English}, urldate = {2019-12-20} } Versatile DDoS Trojan for Linux
BillGates
2014-02-06HabrValdikSS
@online{valdikss:20140206:linux:19651d6, author = {ValdikSS}, title = {{Исследуем Linux Botnet «BillGates»}}, date = {2014-02-06}, organization = {Habr}, url = {https://habrahabr.ru/post/213973/}, language = {Russian}, urldate = {2020-01-07} } Исследуем Linux Botnet «BillGates»
BillGates
Yara Rules
[TLP:WHITE] win_billgates_auto (20230125 | Detects win.billgates.)
rule win_billgates_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.billgates."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.billgates"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 7408 3c22 7404 3c30 7504 }
            // n = 5, score = 200
            //   7408                 | dec                 eax
            //   3c22                 | lea                 edi, [ecx + 0x20]
            //   7404                 | nop                 dword ptr [eax]
            //   3c30                 | dec                 eax
            //   7504                 | cmp                 dword ptr [edi], 0x10

        $sequence_1 = { 69c0e8030000 99 81e2ff070000 03c2 }
            // n = 4, score = 200
            //   69c0e8030000         | dec                 eax
            //   99                   | lea                 ecx, [esp + 0x30]
            //   81e2ff070000         | dec                 esp
            //   03c2                 | cmovae              eax, dword ptr [esp + 0x40]

        $sequence_2 = { 3bf0 7604 2bf0 eb04 }
            // n = 4, score = 200
            //   3bf0                 | lea                 ecx, [esp + 0x74]
            //   7604                 | cmp                 dword ptr [ebp + 0x34], edi
            //   2bf0                 | jb                  0x4b
            //   eb04                 | mov                 eax, dword ptr [ebp + 0x20]

        $sequence_3 = { 750c ff15???????? 8bd8 f7db }
            // n = 4, score = 200
            //   750c                 | mov                 eax, dword ptr [ebp]
            //   ff15????????         |                     
            //   8bd8                 | push                ebp
            //   f7db                 | mov                 ebp, esp

        $sequence_4 = { 83f8ff 750c ff15???????? 8bd8 f7db }
            // n = 5, score = 200
            //   83f8ff               | mov                 eax, dword ptr [ecx + esi*8 + 0x592e0]
            //   750c                 | dec                 esp
            //   ff15????????         |                     
            //   8bd8                 | mov                 dword ptr [eax + esi + 0x40], ebx
            //   f7db                 | dec                 ebx

        $sequence_5 = { 3c21 7408 3c23 7404 }
            // n = 4, score = 200
            //   3c21                 | cmp                 eax, edx
            //   7408                 | jbe                 0x167
            //   3c23                 | mov                 eax, 1
            //   7404                 | ret                 

        $sequence_6 = { 3c11 7408 3c22 7404 3c30 }
            // n = 5, score = 200
            //   3c11                 | sub                 bl, 0x41
            //   7408                 | cmp                 bl, 5
            //   3c22                 | jmp                 0x31a
            //   7404                 | lea                 ecx, [esi + 0x34]
            //   3c30                 | push                ecx

        $sequence_7 = { 3c10 740c 3c11 7408 }
            // n = 4, score = 200
            //   3c10                 | cmp                 eax, ecx
            //   740c                 | ja                  0x140
            //   3c11                 | jne                 0x135
            //   7408                 | test                edx, edx

        $sequence_8 = { 8d8809f9ffff b8c94216b2 f7e9 03d1 c1fa04 }
            // n = 5, score = 200
            //   8d8809f9ffff         | lea                 ecx, [esp + 0x200]
            //   b8c94216b2           | mov                 byte ptr [esi + 0x520], 0
            //   f7e9                 | mov                 byte ptr [esi + 0x4a1], 4
            //   03d1                 | jne                 0x382
            //   c1fa04               | dec                 esp

        $sequence_9 = { 3c10 740c 3c11 7408 3c22 7404 }
            // n = 6, score = 200
            //   3c10                 | sbb                 byte ptr [ecx - 0x75], cl
            //   740c                 | add                 bl, al
            //   3c11                 | dec                 eax
            //   7408                 | mov                 ecx, dword ptr [ecx + 8]
            //   3c22                 | cmp                 byte ptr [ecx + 0x21], 0
            //   7404                 | jne                 0x2a

    condition:
        7 of them and filesize < 801792
}
Download all Yara Rules