Difference between revisions of "Insights into Win32/Bradop"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Image=Insights into Win32Bradop.png
|Image=Insights into Win32Bradop.png
|Legend=
|Botnet=Bradop,
|Malware=,
|CCProtocol=,
|Year=2012
|Date=2012-06-15
|Editor=Microsoft
|Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx
|Author=,
|Type=Blogpost
|Abstract=Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.
|Document=
|Document=
|Licence=
|Licence=
|Video=
|Video=
|Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx blog.technet.com
|Author=,
|NomRevue=Microsoft Malware Protection Center
|NomRevue=Microsoft Malware Protection Center
|Date=15 Jun 2012
|Editor=Microsoft
|Year=2012
|ISBN=
|ISBN=
|Page=
|Page=
|Abstract=Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.
|Operation=,
|Botnet=Bradop,
|Keyword=,
|Malware=,
|CCProtocol=,
|Operation=,  
|Keyword=,  
}}
}}

Latest revision as of 22:56, 30 July 2015

(Publication) Google search: [1]

Insights into Win32/Bradop
Insights into Win32Bradop.png
Botnet Bradop
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-06-15
Editor/Conference Microsoft
Link http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx (Archive copy)
Author
Type Blogpost

Abstract

Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1041,
   editor = {Microsoft},
   author = {},
   title = {Insights into Win32/Bradop},
   date = {15},
   month = Jun,
   year = {2012},
   howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx}},
 }