Analysis of a VBScript bot

From Botnets.fr
Revision as of 21:54, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " research.zscaler.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Analysis of a VBScript bot
Botnet Jenxcus
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 /
Editor/Conference Zscaler
Link http://research.zscaler.com/2014/01/analysis-of-vbscript-bot.html (Archive copy)
Author
Type Blogpost

Abstract

In the long list of complex threats that we see daily, it is interesting to see malware that is rather simple but effective in terms of the payload that it carries. At Zscaler ThreatLabZ, we recently

came across one such innocent looking Bot, which targeted our customers. The file arrived as an attachment to a spam email message. The malware was written in VBScript.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1373,
   editor = {Zscaler},
   author = {},
   title = {Analysis of a VBScript bot},
   date = {25},
   month = May,
   year = {2014},
   howpublished = {\url{http://research.zscaler.com/2014/01/analysis-of-vbscript-bot.html}},
 }