Difference between revisions of "Encriyoko"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
Line 1: Line 1:
{{Botnet
{{Botnet
|Introduction=Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée
|Introduction=Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée
|Target=Microsoft Windows
|CCProtocol=HTTP
|Feature=Encrypt files, File theft,
|Status=Unknown
|BeginYear=Unknown
|EndYear=Unknown
|Group=Stealing
|Fonctionnalités=* [[feature::Encrypt files]]
|Fonctionnalités=* [[feature::Encrypt files]]
* [[feature::File theft]]
* [[feature::File theft]]
Line 7: Line 14:
|Infrastructure=
|Infrastructure=
|Commercialisation=
|Commercialisation=
|UserAgent=Unknown
|UserAgent2=
|UserAgent2=
|UserAgent3=
|UserAgent3=
Line 16: Line 22:
|Language3=
|Language3=
|Language4=
|Language4=
|CCProtocol=HTTP
|CC2=
|CC2=
|CC3=
|CC3=
|Target=Microsoft Windows
|OS2=
|OS2=
|OS3=
|OS3=
|OS4=
|OS4=
|Status=Unknown
|BeginYear=Unknown
|EndYear=Unknown
|Group=Stealing
|Groupe2=Cryptolocker
|Groupe2=Cryptolocker
|Alias=
|Vendor1=
|Vendor1=
|Alias=
|Vendor2=
|Vendor2=
|Alias=
|Vendor3=
|Vendor3=
|Alias=
|Vendor4=
|Vendor4=
|Alias=
|Vendor5=
|Vendor5=
|Alias=
|Vendor6=
|Vendor6=
|Alias=
|Vendor7=
|Vendor7=
|Alias=
|Vendor8=
|Vendor8=
|Alias=
|Vendor9=
|Vendor9=
|Alias=
|Vendor10=
|Vendor10=
|Vector=
|Exploitkit2=
|Exploitkit2=
|Exploitkit3=
|Exploitkit3=

Revision as of 14:40, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Encriyoko
Alias
Group Stealing
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Microsoft Windows
Origin
Distribution vector
UserAgent
CCProtocol HTTP (Centralized)
Activity Unknown / Unknown
Status Unknown
Language
Programming language
Operation/Working group

Introduction

Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée

Features


Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
Malware Uses Google Go LanguageFlora LiuSymantec2012
Malware discovered developed with Google's "Go" programming languageSteve RaganWired Business Media2012