Difference between revisions of "Encriyoko"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - "=Unknown" to "=") |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Botnet | {{Botnet | ||
|Introduction=Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée | |Introduction=Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée | ||
|Target=Microsoft Windows | |||
|CCProtocol=HTTP | |||
|Feature=Encrypt files, File theft, | |||
|Status= | |||
|BeginYear= | |||
|EndYear= | |||
|Group=Stealing | |||
|Fonctionnalités=* [[feature::Encrypt files]] | |Fonctionnalités=* [[feature::Encrypt files]] | ||
* [[feature::File theft]] | * [[feature::File theft]] | ||
Line 7: | Line 14: | ||
|Infrastructure= | |Infrastructure= | ||
|Commercialisation= | |Commercialisation= | ||
|UserAgent2= | |UserAgent2= | ||
|UserAgent3= | |UserAgent3= | ||
Line 16: | Line 22: | ||
|Language3= | |Language3= | ||
|Language4= | |Language4= | ||
|CC2= | |CC2= | ||
|CC3= | |CC3= | ||
|OS2= | |OS2= | ||
|OS3= | |OS3= | ||
|OS4= | |OS4= | ||
|Groupe2=Cryptolocker | |Groupe2=Cryptolocker | ||
|Vendor1= | |Vendor1= | ||
|Vendor2= | |Vendor2= | ||
|Vendor3= | |Vendor3= | ||
|Vendor4= | |Vendor4= | ||
|Vendor5= | |Vendor5= | ||
|Vendor6= | |Vendor6= | ||
|Vendor7= | |Vendor7= | ||
|Vendor8= | |Vendor8= | ||
|Vendor9= | |Vendor9= | ||
|Vendor10= | |Vendor10= | ||
|Exploitkit2= | |Exploitkit2= | ||
|Exploitkit3= | |Exploitkit3= |
Latest revision as of 15:48, 8 August 2015
(Botnet) Link to the old Wiki page : [1] / Google search: [2]
Encriyoko | |
---|---|
Alias | |
Group | Stealing |
Parent | |
Sibling | |
Family | |
Relations | Variants: Sibling of: |
Target | Microsoft Windows |
Origin | |
Distribution vector | |
UserAgent | |
CCProtocol | HTTP (Centralized) |
Activity | / |
Status | |
Language | |
Programming language | |
Operation/Working group |
Introduction
Utilise l'algorithme de chiffrement Blowfish pour chiffrer les fichiers présents sur la machine infectée
Features
Associated images
Checksums / AV databases
Publications
Author | Editor | Year | |
---|---|---|---|
Malware Uses Google Go Language | Flora Liu | Symantec | 2012 |
Malware discovered developed with Google's "Go" programming language | Steve Ragan | Wired Business Media | 2012 |