Necurs Quick Analysis
Jump to navigation
Jump to search
(Publication) Google search: [1]
Necurs Quick Analysis | |
---|---|
![]() | |
Botnet | Necurs |
Malware | Necurs.A |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | HTTP |
Date | 2012 / 2012-08-17 |
Editor/Conference | Malware.lu |
Link | http://code.google.com/p/malware-lu/wiki/en necurs analysis (Archive copy) |
Author | RootBSD |
Type | Blogpost |
Abstract
“ This malware is not highly technical. It's designed to run on both x32 and x64 OSes. It can however be annoying to remove it if you do not have a a kernel debugger or the appropriate tools.
This analysis is not finished yet but will be further be updated.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1340, editor = {Malware.lu}, author = {RootBSD}, title = {Necurs Quick Analysis}, date = {17}, month = Aug, year = {2012}, howpublished = {\url{http://code.google.com/p/malware-lu/wiki/en_necurs_analysis}}, }