Difference between revisions of "Madi"

From Botnets.fr
Jump to navigation Jump to search
m (Text replacement - "=Unknown" to "=")
 
Line 5: Line 5:
|Target=Microsoft Windows
|Target=Microsoft Windows
|Feature=File theft, Keylogger, Screen capture, Email surveillance, IM surveillance,
|Feature=File theft, Keylogger, Screen capture, Email surveillance, IM surveillance,
|Status=Unknown
|Status=
|BeginYear=2011
|BeginYear=2011
|EndYear=Unknown
|EndYear=
|Group=Spying
|Group=Spying
|Fonctionnalités=* Vol de [[feature::File theft|fichiers]]
|Fonctionnalités=* Vol de [[feature::File theft|fichiers]]

Latest revision as of 15:46, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Madi
Alias Mahdi
Group Spying
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Microsoft Windows
Origin
Distribution vector
UserAgent
CCProtocol
Activity 2011 /
Status
Language
Programming language
Operation/Working group

Introduction

  • According to Seculert, almost 1000 victims identified
  • The beginning of this botnet dates at least back to dec 2011

Features


Associated images

Checksums / AV databases

Publications

 AuthorEditorYear
Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑OrientKaspersky LabGlobal Security Mag2012
Madi is back - New Tricks and a new Command&Control serverNicolas BrulezKaspersky lab2012
Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasiveMike LennonWired Business Media2012
The Madi campaign - Part IINicolas BrulezKaspersky lab2012
The ‘Madi’ infostealers - a detailed analysisNicolas BrulezKaspersky lab2012