Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
Jump to navigation
Jump to search
(Publication) Google search: [1]
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel | |
---|---|
Botnet | Upas |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-08-16 |
Editor/Conference | Blogspot |
Link | http://malware.dontneedcoffee.com/2012/08/inside-upas-kit1.0.1.1.html (Archive copy) |
Author | Kafeine |
Type |
Abstract
“ In middle of june a new botnet was advertised on underground forum as Upas Kit. (see end of this post for advert). Bot is recognized by Microsoft in Win32/Rombrast familly
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1224, editor = {Blogspot}, author = {Kafeine}, title = {Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel}, date = {16}, month = Aug, year = {2012}, howpublished = {\url{http://malware.dontneedcoffee.com/2012/08/inside-upas-kit1.0.1.1.html}}, }