Win32/Gataka banking Trojan - Detailed analysis

From Botnets.fr
Revision as of 15:27, 7 February 2015 by Eric.freyssinet (talk | contribs) (1 revision imported)
Jump to navigation Jump to search

(Publication) Google search: [1]

Win32/Gataka banking Trojan - Detailed analysis
Botnet Gataka
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 14 août 2012
Editor/Conference ESET
Link http://blog.eset.com/2012/08/13/win32gataka-banking-trojan-detailed-analysis blog.eset.com (blog.eset.com Archive copy)
Author Jean-Ian Boutin
Type

Abstract

Win32/Gataka is an information-stealing banking Trojan that can read all of your web traffic and alter the balance displayed on your online banking page to hide fraudulent transfers. It exhibits a modular architecture similar to that of SpyEye, where plugins are required to achieve most of the malware functionality. In our previous blog post, we gave an overview of the botnet’s capabilities and some of its recent campaigns. In this second blog post, we will look in more detail at two of the main components of Win32/Gataka: the Webinject and Interceptor plugins. As also shown in the previous blog post, here is the general architecture that characterizes Win32/Gataka. Please refer to the first blog post for a description of each plugin’s functionalities.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1089,
   editor = {ESET},
   author = {Jean-Ian Boutin},
   title = {Win32/Gataka banking Trojan - Detailed analysis},
   date = {Error: Invalid time.},
   month = Error: Invalid time.,
   year = {2012},
   howpublished = {\url{http://blog.eset.com/2012/08/13/win32gataka-banking-trojan-detailed-analysis blog.eset.com}},
 }