Difference between revisions of "Ponmocup analysis"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
 
Line 1: Line 1:
{{Publication
{{Publication
|Image=
|Botnet=Ponmocup,
|Legend=
|Malware=,
|Document=
|CCProtocol=,
|Licence=
|Operation=,
|Video=
|Link=http://security-research.dyndns.org/pub/botnet/ponmocup/ponmocup-analysis_2012-02-18.html security-research.dyndns.org
|Author=Tom U,  
|NomRevue=
|Date=
|Editor=
|Year=2012
|Year=2012
|ISBN=
|Link=http://security-research.dyndns.org/pub/botnet/ponmocup/ponmocup-analysis_2012-02-18.html
|Page=
|Author=Tom U,
|Abstract=Why is this malware known under so many different names? (Ponmocup, Pirminay, Kryptik, Swisyn, Vundo etc.)
|Abstract=Why is this malware known under so many different names? (Ponmocup, Pirminay, Kryptik, Swisyn, Vundo etc.)
Why aren't AV companies connecting the dots?
Why aren't AV companies connecting the dots?
Line 25: Line 19:
HKLM\SOFTWARE\[pseudo-random-key]
HKLM\SOFTWARE\[pseudo-random-key]
which seems to be consistent amongst systems with a certain trait (maybe same company, domain or similar).
which seems to be consistent amongst systems with a certain trait (maybe same company, domain or similar).
|Botnet=Ponmocup,
|Document=
|Malware=,
|Licence=
|CCProtocol=,
|Video=
|Operation=,
|NomRevue=
|Keyword=,  
|ISBN=
|Page=
|Keyword=,
}}
}}

Latest revision as of 21:07, 31 July 2015

(Publication) Google search: [1]

Ponmocup analysis
Botnet Ponmocup
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 /
Editor/Conference
Link http://security-research.dyndns.org/pub/botnet/ponmocup/ponmocup-analysis 2012-02-18.html (Archive copy)
Author Tom U
Type

Abstract

Why is this malware known under so many different names? (Ponmocup, Pirminay, Kryptik, Swisyn, Vundo etc.)

Why aren't AV companies connecting the dots?

Using one common indicator, the existence or creation of a registry key, namely HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\6 and/or HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\6 I've been finding malware analysis reports from different AV's and online malware analysis sites.

Another indicator is the existence of a pseudo-random registry key under HKLM\SOFTWARE\[pseudo-random-key] which seems to be consistent amongst systems with a certain trait (maybe same company, domain or similar).

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1057,
   editor = {},
   author = {Tom U},
   title = {Ponmocup analysis},
   date = {19},
   month = May,
   year = {2012},
   howpublished = {\url{http://security-research.dyndns.org/pub/botnet/ponmocup/ponmocup-analysis_2012-02-18.html}},
 }