Analysis: Malware Win32/Rimecud.B

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Analysis: Malware Win32/Rimecud.B
Botnet Rimecud
Malware Rimecud.b
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 / 09/05/2011
Editor/Conference
Link https://community.qualys.com/blogs/securitylabs/2011/05/09/analysis-malware-win32rimecudb (Archive copy)
Author Bharat Jogi, Qualys Security Labs
Type Blogpost

Abstract

Infections of Win32/Rimecud.B were first spotted in the wild in the second half of 2010, but customers are still calling us due to difficulties in removing it even in the presence of anti-virus software. So we decided to analyze it and on the way also describe some interesting anti-debugging techniques that are used by it. We also analyze the malware's behavior once a system is infected...

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR1349,
   editor = {},
   author = {Bharat Jogi, Qualys Security Labs},
   title = {Analysis: Malware Win32/Rimecud.B},
   date = {05},
   month = Sep,
   year = {2011},
   howpublished = {\url{https://community.qualys.com/blogs/securitylabs/2011/05/09/analysis-malware-win32rimecudb}},
 }