Analysis of a stage 3 Miniduke malware sample
Jump to navigation
Jump to search
(Publication) Google search: [1]
Analysis of a stage 3 Miniduke malware sample | |
---|---|
Botnet | MiniDuke |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-05-30 |
Editor/Conference | CIRCL |
Link | https://www.circl.lu/pub/tr-14/ (Archive copy) |
Author | |
Type | White paper |
Abstract
“ In the scope of targeted attacks with a malware labeled as Miniduke by Kaspersky Labs, CIRCL was interested in the way the malware’s later stages work and what kind of interesting information they reveal (e.g. techniques, style, IOCs) . No public analysis was found except the mention in Kaspersky’s report of a custom backdoor, so CIRCL took one of the known samples and started this analysis.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1336, editor = {CIRCL}, author = {}, title = {Analysis of a stage 3 Miniduke malware sample}, date = {30}, month = May, year = {2013}, howpublished = {\url{https://www.circl.lu/pub/tr-14/}}, }