Security analysts have detected a new strain of malware based heavily on the Gameover ZeuS, which infected users’ computers and joined them up to a massive botnet. That botnet, in turn, specifically was designed to steal banking passwords on Windows machines.

The revival comes just six weeks after American authorities announced a global takedown of the botnet earlier this year. Prosecutors say Gameover ZeuS’ masterminds have stolen more than $100 million as a result.

In a sneaky move similar to its predecessor, the new strain uses a “Domain Generation Algorithm” (DGA), where the infected computer attempts to contact a list of gibberish domain names. In this case, the analysts at the security firm Malcovery determined that it was able to successfully connect to the domain cfs50p1je5ljdfs3p7n17odtuw.biz.

Whois records show that domain was registered in China on Thursday.

The new version of Gameover ZeuS has a new DGA list, but it also now employs a “fast flux” tactic to obscure command and control servers across various hosts, rather than the earlier peer-to-peer model.

In a statement released on Friday, the Department of Justice reiterated that this new strain was not connected with the botnet that it previously targeted.

“The Justice Department reported that all or nearly all of the active computers infected with Gameover Zeus have been liberated from the criminals’ control and are now communicating exclusively with the substitute server established pursuant to court order,” the agency said. “The Justice Department also reported that traffic data from the substitute server shows that remediation efforts by Internet service providers and victims have reduced the number of computers infected with Gameover Zeus by 31 percent since the disruption commenced.”