Beast Trojan (trojan horse)

Beast Trojan (trojan horse)

Infobox Software
name = Beast Trojan|website = No


caption = screenshot of the Beast RAT
developer = Tataye
operating_system = Microsoft Windows
latest_release_version = 2.07
latest_release_date = August 3, 2004
genre = remote administration, trojan horse
license = freeware

Beast is a windows based backdoor trojan horse, more commonly known in the underground cracker community as a RAT (Remote Administration Tool). It is capable of infecting almost all Windows OS i.e. 95 through XP. Written in Delphi and Released first by its author Tataye in 2002, it became quite popular due to its unique features. It used the typical client/server mechanism where the client would be under operation by the attacker and the server is what would infect the victim. Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer. Using the 'reverse connection' there was no need for the attacker to know the target IP, instead the server itself connected to a predefined DNS, which was redirected to the attacker IP. For its DLL, it used the 'injection method' i.e. they were injected into a specified process, commonly 'explorer.exe' (Windows Explorer), 'iexplore.exe' (Internet Explorer) or 'msnmsgr.exe' (MSN Messenger). Due to this the DLLs were automatically loaded into the memory once these processes were executed.

Its targeted infection sites were mainly three:
* C:Windowsmsagentms****.com (Size ranging from 30KB to 49KB)
* C:WindowsSystem32ms****.com (Size ranging from 30KB to 49KB)
* C:Windowsdxdgns.dll or C:WindowsSystem32dxdgns.dll (Location dependent on attacker's choice)

(Note: Removing these three files in safe mode with system restore turned off in case of XP would thus disinfect the system)

The default ports used for the direct and reverse connections were 6666 and 9999 respectively, though the attacker had the option of changing these. Beast came with a built-in Firewall bypasser and had the ability of terminating any Anti-Virus or Firewall processes. It also came with a binder that could be used to join two or more files together and then change their icon.

The Server Editor offered these capabilities:
* Direct or Reverse connection option
* DLL injection location (e.g explorer.exe)
* Server name change option
* Server installation directory (e.g )
* Various IP and Server info notification options (e.g email, icq, cgi etc)
* Startup keys selection
* Anti-Virus and Firewall killing
* Other miscellneous options (e.g automatic server file deletion, fake error messages, offline keylogger, icon changer etc)

Once connected to the victim, Beast offered the following features:
* File Manager, that along with browsing victim's directories could upload, download, delete or execute any file at will
* Remote Registry Editor
* Screenshots and Webcam capture utility
* Services, Applications and Processes Managers, providing the ability of terminating or executing any of these
* Clipboard tool that could get currently stored strings, and a Passwords tool capable of recovering any stored passwords in the victim's computer
* Power Options (e.g shutdown, reboot, logoff, crash etc)
* Some tools mainly for creating nuisance (e.g mouse locking, taskbar hiding, CD-ROM operator and locker, URl opener, wallpaper changer etc)
* Chat client providing communication between the attacker and the victim
* Other tools such as a Remote IP scanner, live keylogger, offline logs downloader etc
* Server Controls (e.g server deleter, updater, terminator, info provider etc)

Later Tataye decided to abandon the Series with its final version going out in August 2004. But rather than completely abandoning the software, Tataye turned to a more commercial option when in early 2005 he released the first version of Spytector, a legitimate keylogger. Spytector uptil now has won highest ratings from many leading Downloads Websites (e.g [http://www.softpedia.com Softpedia] , [http://www.top-shareware.net Top-Shareware] ). Although Beast has been officially discontinued, it is still available from some of the underground websites that promote hacking material.


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Trojan horse (computing) — Beast, a Windows based backdoor Trojan horse A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms… …   Wikipedia

  • List of trojan horses — *AytonScape *Bandook *Beast Trojan *Bifrost * Downloader.Zlob *Bohmini.A *Generic8.LDI *Generic9.ABWM *Generic9.ZYW *Graybird (Backdoor Graybird, Backdoor Graybird P) *Insurrection *Koobface (attacks through social networking message links)… …   Wikipedia

  • List of Marvel Family enemies — Through his adventures, Fawcett Comics/DC Comics superhero Captain Marvel and his Marvel Family gained a host of enemies, including the following: Contents 1 Acrobat 2 Adolf Hitler 3 Amoeba Family …   Wikipedia

  • Timeline of computer viruses and worms — Contents 1 1960–1969 1.1 1966 2 1970–1979 2.1 1 …   Wikipedia

  • Список телесериалов по наименованию — Содержание 1 Русскоязычные 2 На других языках 3 0 9 4 Латиница …   Википедия

  • List of cultural references in The Divine Comedy — The Divine Comedy by Dante Alighieri is a long allegorical poem in three parts or canticas (or cantiche ), Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise), and 100 cantos, with the Inferno having 34, Purgatorio 33, and Paradiso 33 …   Wikipedia

  • List of fictional horses — This is a list of horses in fictional subjects.Horses in mythology* Arion, an immortal, extremely swift horse * Arvak and Alsvid pulled Sól s chariot * Balius and Xanthos, Achilles horses * Centaur, part human, part horse * Dyaus Pita, the Sky… …   Wikipedia

  • Supply-side economics — is an arguably heterodox school of macroeconomic thought that argues that economic growth can be most effectively created using incentives for people to produce (supply) goods and services, such as adjusting income tax and capital gains tax rates …   Wikipedia

  • List of heraldic charges — This article does not cover those charges which derive their shape in part from that of the field; see Ordinary (heraldry). Subordinary chargesA few simple charges are traditionally, and arbitrarily, classified among the subordinaries. (All other …   Wikipedia

  • Sea serpent — This article is about sea serpents in mythology and cryptozoology. For actual marine snakes, see Sea snake. For other uses, see Sea serpent (disambiguation). Sea Serpent (Various) A sea serpent from Olaus Magnus s book History of the Northe …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”