Difference between revisions of "Encriyoko"
Jump to navigation
Jump to search
m (Text replacement - "=Unknown" to "=") |
|||
Line 4: | Line 4: | ||
|CCProtocol=HTTP | |CCProtocol=HTTP | ||
|Feature=Encrypt files, File theft, | |Feature=Encrypt files, File theft, | ||
|Status= | |Status= | ||
|BeginYear= | |BeginYear= | ||
|EndYear= | |EndYear= | ||
|Group=Stealing | |Group=Stealing | ||
|Fonctionnalités=* [[feature::Encrypt files]] | |Fonctionnalités=* [[feature::Encrypt files]] |
Latest revision as of 15:48, 8 August 2015
(Botnet) Link to the old Wiki page : [1] / Google search: [2]
Encriyoko | |
---|---|
Alias | |
Group | Stealing |
Parent | |
Sibling | |
Family | |
Relations | Variants: Sibling of: |
Target | Microsoft Windows |
Origin | |
Distribution vector | |
UserAgent | |
CCProtocol | HTTP (Centralized) |
Activity | / |
Status | |
Language | |
Programming language | |
Operation/Working group |
Introduction
Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée
Features
Associated images
Checksums / AV databases
Publications
Author | Editor | Year | |
---|---|---|---|
Malware Uses Google Go Language | Flora Liu | Symantec | 2012 |
Malware discovered developed with Google's "Go" programming language | Steve Ragan | Wired Business Media | 2012 |