Difference between revisions of "Expiro"

From Botnets.fr
Jump to navigation Jump to search
m (Text replacement - "=Unknown" to "=")
 
Line 4: Line 4:
|CCProtocol=HTTP
|CCProtocol=HTTP
|Feature=Credit card data theft, SOCKS, HTTP proxy, TCP flood, Chrome browser extension, Mozilla browser extension, URL redirection, FileZilla password theft, Outlook password theft, Internet Explorer password theft, Cross-infection,
|Feature=Credit card data theft, SOCKS, HTTP proxy, TCP flood, Chrome browser extension, Mozilla browser extension, URL redirection, FileZilla password theft, Outlook password theft, Internet Explorer password theft, Cross-infection,
|Status=Unknown
|Status=
|BeginYear=Unknown
|BeginYear=
|EndYear=Unknown
|EndYear=
|Group=Stealing, Click frauding,
|Group=Stealing, Click frauding,
|Fonctionnalités=* [[feature::Cross-infection]]
|Fonctionnalités=* [[feature::Cross-infection]]

Latest revision as of 15:45, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Expiro
Alias Xpiro
Group Stealing, Click frauding
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Microsoft Windows
Origin
Distribution vector
UserAgent
CCProtocol HTTP (Centralized)
Activity /
Status
Language
Programming language
Operation/Working group

Introduction

Features


Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
File infector Expiro hits US, steals FTP credentialsRhena InocencioTrend Micro2013
First widespread virus cross-infectionJeet MorpariaSymantec2013
Versatile and infectious: Win64/Expiro is a cross-platform file infectorArtem I. BaranovESET2013