Sinowal analysis (Windows 7, 32-bit)

From Botnets.fr
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

(Publication) Google search: [1]

Sinowal analysis (Windows 7, 32-bit)
Botnet Torpig
Malware Sinowal, Mebroot
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / March 3, 2012
Editor/Conference evild3ad.com
Link http://www.evild3ad.com/?p=1556 www.evild3ad.com (www.evild3ad.com Archive copy)
Author evild3ad
Type

Abstract

Sinowal (also known as Torpig or Anserin) is constant one of the top banking trojan all over the world since 2006. So I asked myself, why is there so little info on the web? Just found old articles, that’s why I decided to take a new look at Sinowal.

Sinowal is a spyware trojan that can be used to perform post-authentication man-in-the-middle (MitM) content-manipulation attacks, a fancy way of saying that it can change basically anything sent or received between your browser and any web server in any HTTP session, even those encrypted by TLS/SSL. It’s also been incorporated with a boot sector rootkit known as Mebroot (MAOS).

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR908,
   editor = {evild3ad.com},
   author = {evild3ad},
   title = {Sinowal analysis (Windows 7, 32-bit)},
   date = {03},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://www.evild3ad.com/?p=1556 www.evild3ad.com}},
 }