Difference between revisions of "Insights into Win32/Bradop"

From Botnets.fr
Jump to navigation Jump to search
 
Line 5: Line 5:
|CCProtocol=,
|CCProtocol=,
|Year=2012
|Year=2012
|Date=15 Jun 2012
|Date=2012-06-15
|Editor=Microsoft
|Editor=Microsoft
|Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx
|Link=http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx

Latest revision as of 22:56, 30 July 2015

(Publication) Google search: [1]

Insights into Win32/Bradop
Insights into Win32Bradop.png
Botnet Bradop
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-06-15
Editor/Conference Microsoft
Link http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx (Archive copy)
Author
Type Blogpost

Abstract

Have you heard of Win32/Bradop? We recently investigated this interesting data theft family in more detail and exposed some of its inner secrets. The following is a description of what we found out. Spoiler alert: spam emails, protectors, the download mechanism, database credentials, stolen data, and the source code all figure in prominently.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1041,
   editor = {Microsoft},
   author = {},
   title = {Insights into Win32/Bradop},
   date = {15},
   month = Jun,
   year = {2012},
   howpublished = {\url{http://blogs.technet.com/b/mmpc/archive/2012/06/15/insights-into-win32-bradop.aspx}},
 }