Flame

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Flame
Alias
Group Spying
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target
Origin
Distribution vector
UserAgent
CCProtocol
Activity 2010 /
Status
Language
Programming language
Operation/Working group

Introduction

Features

Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
Analysis of functions used to encode strings in Flame (GDB script)RootBSDMalware.lu2012
Back to Stuxnet: the missing linkAleksKaspersky lab2012
Crypto breakthrough shows Flame was designed by world-class scientistsDan Goodin2012
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocxAleksandr Matrosov
Eugene Rodionov
ESET2012
Flame: replication via Windows Update MITM proxyAleksKaspersky lab2012
Flamer analysis: framework reconstructionAleksandr Matrosov
Eugene Rodionov
ESET2012
Flamer: highly sophisticated and discreet threat targets the Middle EastSymantec2012
Flamer: urgent suicideSymantec2012
Full analysis of Flame's Command & Control serversGReATKaspersky lab2012
Full analysis of Flame's command & control serversGReATKaspersky lab2012
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATKaspersky lab2012
Guys behind Gauss and Flame are the sameAli IslamFireEye2012
Interconnection of Gauss with Stuxnet, Duqu & FlameEugene RodionovESET2012
Meet ‘Flame’, the massive spy malware infiltrating Iranian computersKim Zetter2012
More Flame/Skywiper CNC behavior uncoveredAli IslamFireEye2012
QuickPost: Flame & VolatilityMichael Hale Ligh2012
SKyWIper: A complex malware for targeted attacksSKyWIper Analysis Team
Budapest University of Technology and Economics
CrySyS Lab2012
The Flame: questions and answersAlexander GostevKaspersky lab2012
W32.Flamer: spreading mechanism tricks and exploitsSymantec2012