Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel

From Botnets.fr
Revision as of 19:02, 7 February 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " malware.dontneedcoffee.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
Botnet Upas
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-08-16
Editor/Conference Blogspot
Link http://malware.dontneedcoffee.com/2012/08/inside-upas-kit1.0.1.1.html (Archive copy)
Author Kafeine
Type

Abstract

In middle of june a new botnet was advertised on underground forum as Upas Kit. (see end of this post for advert). Bot is recognized by Microsoft in Win32/Rombrast familly

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1224,
   editor = {Blogspot},
   author = {Kafeine},
   title = {Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel},
   date = {16},
   month = Aug,
   year = {2012},
   howpublished = {\url{http://malware.dontneedcoffee.com/2012/08/inside-upas-kit1.0.1.1.html}},
 }