Analysis of a VBScript bot
Revision as of 12:32, 26 January 2014 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Analysis of a VBScript bot | |
---|---|
Botnet | Jenxcus |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2014 / |
Editor/Conference | Zscaler |
Link | http://research.zscaler.com/2014/01/analysis-of-vbscript-bot.html research.zscaler.com (research.zscaler.com Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ In the long list of complex threats that we see daily, it is interesting to see malware that is rather simple but effective in terms of the payload that it carries. At Zscaler ThreatLabZ, we recently
came across one such innocent looking Bot, which targeted our customers. The file arrived as an attachment to a spam email message. The malware was written in VBScript.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1373, editor = {Zscaler}, author = {}, title = {Analysis of a VBScript bot}, date = {01}, month = May, year = {2014}, howpublished = {\url{http://research.zscaler.com/2014/01/analysis-of-vbscript-bot.html research.zscaler.com}}, }