Thursday, October 14, 2010
Domain Name Generator for Murofet
›
This post describes a technique that allows building a domain name generator for Murofet. The pseudo-random domain generators are not new – ...
Thursday, August 19, 2010
Matryoshka in Flash
›
Second part of the article from the Crime Scene Investigation:Internet series has now been published by c't magazine . This time the Ac...
Wednesday, August 4, 2010
Angriff der Killervideos
›
It took some time, some patience and some extra samples analysed to see how the original blog post on a Flash exploit has eventually evolve...
Sunday, May 2, 2010
Config Decryptor for ZeuS 2.0
›
ZeuS 2.0 kit release introduces a few tricks designed to complicate the analysis of its configuration files. Apart from randomized side-effe...
Wednesday, April 28, 2010
WoW Factor or Back Into Matrix
›
Online gaming password stealers form a large malware category. Moreover, it is growing: there is strong demand in the virtual experience, th...
Saturday, January 16, 2010
Trojan.Hydraq - Part II
›
Previous post described the installation process of the trojan and its backdoor commands. Now it's time to inspect its connection detai...
Wednesday, January 13, 2010
Trojan.Hydraq Exposed
›
The post describes functionality (static analysis) of the trojan that was reported in the recent targeted attacks against some large compan...
›
Home
View web version