Difference between revisions of "Insights into Win32/Bradop"
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
|CCProtocol=, | |CCProtocol=, | ||
|Year=2012 | |Year=2012 | ||
|Date=15 | |Date=2012-06-15 | ||
|Editor=Microsoft | |Editor=Microsoft | ||
|Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx | |Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx |
Latest revision as of 22:56, 30 July 2015
(Publication) Google search: [1]
Insights into Win32/Bradop | |
---|---|
![]() | |
Botnet | Bradop |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-06-15 |
Editor/Conference | Microsoft |
Link | http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1041, editor = {Microsoft}, author = {}, title = {Insights into Win32/Bradop}, date = {15}, month = Jun, year = {2012}, howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx}}, }