Analysis: Malware Win32/Rimecud.B

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Publication) Google search: [1]

Analysis: Malware Win32/Rimecud.B
Botnet Rimecud
Malware Rimecud.b
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 / 09/05/2011
Editor/Conference
Link https://community.qualys.com/blogs/securitylabs/2011/05/09/analysis-malware-win32rimecudb (Archive copy)
Author Bharat Jogi, Qualys Security Labs
Type Blogpost

Abstract

Infections of Win32/Rimecud.B were first spotted in the wild in the second half of 2010, but customers are still calling us due to difficulties in removing it even in the presence of anti-virus software. So we decided to analyze it and on the way also describe some interesting anti-debugging techniques that are used by it. We also analyze the malware's behavior once a system is infected...

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR1349,
   editor = {},
   author = {Bharat Jogi, Qualys Security Labs},
   title = {Analysis: Malware Win32/Rimecud.B},
   date = {05},
   month = Sep,
   year = {2011},
   howpublished = {\url{https://community.qualys.com/blogs/securitylabs/2011/05/09/analysis-malware-win32rimecudb}},
 }