The Pobelka botnet - a command and control case study
Jump to navigation
Jump to search
(Publication) Google search: [1]
The Pobelka botnet - a command and control case study | |
---|---|
Botnet | Pobelka, Citadel |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-12-17 |
Editor/Conference | Digital Investigation |
Link | http://check.botnet.nu/technical.html check.botnet.net (check.botnet.net Archive copy) |
Author | Rickey Gevers |
Type |
Abstract
“ The Pobelka Botnet is a case study about -just another- citadel botnet. The botnet was dubbed Pobelka because the Command and Control that hid behind proxies used the domain name Pobelka***.***. Pobelka in Russian means "Money Laundering". Never was this domain used in any campaign nor malware url.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1274, editor = {Digital Investigation}, author = {Rickey Gevers}, title = {The Pobelka botnet - a command and control case study}, date = {17}, month = Dec, year = {2012}, howpublished = {\url{http://check.botnet.nu/technical.html check.botnet.net}}, }