Difference between revisions of "Expiro"

From Botnets.fr
Jump to navigation Jump to search
Line 3: Line 3:
|Target=Microsoft Windows
|Target=Microsoft Windows
|CCProtocol=HTTP
|CCProtocol=HTTP
|Feature=Credit card data theft, SOCKS, HTTP proxy, TCP flood, Chrome browser extension, Mozilla browser extension, URL redirection, FileZilla password theft, Outlook password theft, Internet Explorer password theft, Cross-infection,
|Status=Unknown
|Status=Unknown
|BeginYear=Unknown
|BeginYear=Unknown

Revision as of 02:52, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Expiro
Alias Xpiro
Group Stealing, Click frauding
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Microsoft Windows
Origin
Distribution vector
UserAgent
CCProtocol HTTP (Centralized)
Activity Unknown / Unknown
Status Unknown
Language
Programming language
Operation/Working group

Introduction

Features


Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
File infector Expiro hits US, steals FTP credentialsRhena InocencioTrend Micro2013
First widespread virus cross-infectionJeet MorpariaSymantec2013
Versatile and infectious: Win64/Expiro is a cross-platform file infectorArtem I. BaranovESET2013