#1
Key Features of Lucifer v1.2 HTTP Botnet1. Exploit-Based Propagation
  • Scans for and exploits known vulnerabilities, including:
    • EternalBlue (MS17-010) – Windows SMB flaw
    • DoublePulsar – Backdoor exploit
    • Apache Struts, WebLogic, and ThinkPHP RCE flaws
    • Weak RDP (Remote Desktop Protocol) credentials
2. Cryptojacking (Monero Mining)
  • Silently installs XMRig miner to steal CPU power.
  • Uses obfuscation to evade detection.
  • Kills competing miners to maximize profits.
3. DDoS Attack Modules
  • Supports multiple attack vectors:
    • HTTP Flood (Overwhelms web servers)
    • TCP/UDP Flood (Exhausts network resources)
    • Slowloris (Keeps connections open to crash servers)
4. Botnet & Remote Control
  • HTTP-based C2 communication (Blends with normal traffic).
  • Dynamic payload updates (New attacks can be deployed remotely).
  • Persistent infection (Survives reboots via registry manipulation).
5. Process Injection & Evasion
  • Injects into legitimate processes (e.g., svchost.exe, explorer.exe).
  • Disables Windows Defender & Firewall.
  • Deletes shadow copies (Prevents system recovery).
6. Credential Theft & Lateral Movement
  • Harvests RDP, FTP, and browser credentials.
  • Spreads across networks using stolen logins & exploits.