An encounter with trojan Nap

From Botnets.fr
Revision as of 21:51, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " blog.fireeye.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

An encounter with trojan Nap
Botnet Nap
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-02-05
Editor/Conference FireEye
Link http://blog.fireeye.com/research/2013/02/an-encounter-with-trojan-nap.html (Archive copy)
Author Abhishek Singh, Ali Islam
Type Blogpost

Abstract

We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux technique in order to hide the identity of the attacker controlling it. We call it Trojan Nap. The purpose of this blog is to share the technical details of the execution steps by Nap.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1299,
   editor = {FireEye},
   author = {Abhishek Singh, Ali Islam},
   title = {An encounter with trojan Nap},
   date = {05},
   month = Feb,
   year = {2013},
   howpublished = {\url{http://blog.fireeye.com/research/2013/02/an-encounter-with-trojan-nap.html}},
 }