This document summarizes the analysis of a domain generating algorithm (DGA) malware family. Key points include:
- The malware uses inline code obfuscation and encrypted strings to hide its functionality and communication domains. Researchers were able to deobfuscate the code and decrypt the strings to analyze the malware.
- Clues in decrypted strings suggest the malware author is Romani, including references to Romani singers in template strings.
- The malware generates domain names by concatenating two randomly selected words from a dictionary and appending ".net". This allows it to generate many domain variations to communicate with its command and control servers.
- The DGA algorithm uses a 15-bit seed value derived from the