Difference between revisions of "Analysis of the malware of Red October - Part 1"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - "Campaign1=" to "Campaign=") |
||
Line 17: | Line 17: | ||
|Malware=, | |Malware=, | ||
|ExploitKit=, | |ExploitKit=, | ||
| | |Campaign=Red October | ||
|Campaign2= | |Campaign2= | ||
|Campaign3= | |Campaign3= |
Revision as of 22:30, 31 July 2015
(Publication) Google search: [1]
Analysis of the malware of Red October - Part 1 | |
---|---|
Botnet | Rocra |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | Red October |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-01-15 |
Editor/Conference | Malware.lu |
Link | http://code.google.com/p/malware-lu/wiki/en malware redoctober code.google.com (code.google.com Archive copy) |
Author | RootBSD, Malware.lu |
Type | Blogpost |
Abstract
“ Today (14th January of 2013), Karspersky started to make the buzz around an ultimate new APT. The malware targets diplomatic, governmental and scientific research organizations in different countries, mostly related to the region of Eastern Europe, former USSR members and countries in Central Asia.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1282, editor = {Malware.lu}, author = {RootBSD, Malware.lu}, title = {Analysis of the malware of Red October - Part 1}, date = {15}, month = Jan, year = {2013}, howpublished = {\url{http://code.google.com/p/malware-lu/wiki/en_malware_redoctober code.google.com}}, }