Insights into Win32/Bradop
Revision as of 22:56, 30 July 2015 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Insights into Win32/Bradop | |
---|---|
![]() | |
Botnet | Bradop |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-06-15 |
Editor/Conference | Microsoft |
Link | http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1041, editor = {Microsoft}, author = {}, title = {Insights into Win32/Bradop}, date = {15}, month = Jun, year = {2012}, howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx}}, }