Search results
Jump to navigation
Jump to search
- ...blicly available information. That helped our understanding of where the C&C servers were located and how they were registered. ...new information that was collected during forensic analysis of the Flame C&C servers. This investigation was done in partnership with Symantec, ITU-IMPA2 KB (272 words) - 18:57, 7 February 2015
- ...jan horse. It receives and executes commands from a command-and-control (C&C) server and it gathers information from the compromised computer including658 bytes (88 words) - 21:43, 5 August 2015
- |Programming language=C, ASM130 bytes (14 words) - 07:04, 15 July 2021
- ...alware that appears to be using Evernote as a communication and control (C&C) server. Detected as BKDR_VERNOT.A, the malware attempts to connect to Ever721 bytes (100 words) - 12:30, 3 August 2015
- ...ctually the “main” function that implements all the logics of contacting C&C servers, receiving additional payload modules and executing them. The most ...ns and user-written code, except the biggest slice that contains most of C&C interaction code.2 KB (256 words) - 18:48, 8 February 2015
- ...d computer. The Flamer attackers were still in control of at least a few C&C servers, which allowed them to communicate with a specific set of compromis ...ontrol server to acquire additional commands. Following the request, the C&C server shipped them a file named browse32.ocx. This file can be summarized2 KB (281 words) - 21:47, 5 August 2015
- ...campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate752 bytes (105 words) - 03:44, 19 August 2015
- ...binaries and the amount of logging information that is sent back to the C&C.1 KB (171 words) - 16:27, 7 February 2015
- ...ration, which disabled the botnet and its backup infrastructure from the C&C.1 KB (232 words) - 19:00, 7 February 2015
- |Link=http://c-apt-ure.blogspot.fr/2012/06/introducing-ponmocup-finder.html c-apt-ure.blogspot.fr |NomRevue=c-APT-ure691 bytes (95 words) - 16:27, 7 February 2015
- ...( ? behind Reveton) is using it to spread Reveton which dress from its C&C with a new "Autumn Collection" and is targeting at least 4 new countries :708 bytes (98 words) - 19:00, 7 February 2015
- ...alware is a ZeuS version 3 variant that uses peer-to-peer as its primary C&C channel and only resorts to the DGAgenerated domains if it fails1 KB (202 words) - 22:58, 5 August 2015
- ...nfect a machine, download the necessary data from a command and control (C&C) server to create spam email messages, and then send the spam out using the ...its droppers, how its bootkit functions and how it communicates with its C&C server.1 KB (216 words) - 22:51, 5 August 2015
- ...up in the last couple weeks is called ZeroLocker. There's indication the C&C configuration contains some errors which would prevent successful decryptio720 bytes (105 words) - 18:47, 8 February 2015
- ...r that creates a Peer-to-Peer (P2P) network of infected computers (using C&C, for instance), and includes a nasty list of payloads, as well as unique me761 bytes (103 words) - 01:11, 31 July 2015
- ...ted machines failed to uncover the characteristic communicatation with a C&C. After closer examination it appeared that the sample was probably a new ve724 bytes (112 words) - 22:52, 5 August 2015
- ...this family (derived from the hostname of one of the initially observed C&C servers.)811 bytes (120 words) - 21:30, 5 August 2015
- ...on the victim host and then sends system/web browser details back to the C&C. The botmasters can use this setup to “spoof” banking requests as the u753 bytes (108 words) - 18:49, 8 February 2015
- ...quest, encrypts the requested data, and sends it to a command & control (C&C) server.838 bytes (115 words) - 22:49, 5 August 2015
- * Load [[feature::Advertising|advertising]] (called AdSense in C&C)882 bytes (109 words) - 15:42, 8 August 2015