ThreatExpert Blog
Thursday, October 14, 2010

Domain Name Generator for Murofet

›
This post describes a technique that allows building a domain name generator for Murofet. The pseudo-random domain generators are not new – ...
Thursday, August 19, 2010

Matryoshka in Flash

›
Second part of the article from the Crime Scene Investigation:Internet series has now been published by c't magazine . This time the Ac...
Wednesday, August 4, 2010

Angriff der Killervideos

›
It took some time, some patience and some extra samples analysed to see how the original blog post on a Flash exploit has eventually evolve...
Sunday, May 2, 2010

Config Decryptor for ZeuS 2.0

›
ZeuS 2.0 kit release introduces a few tricks designed to complicate the analysis of its configuration files. Apart from randomized side-effe...
Wednesday, April 28, 2010

WoW Factor or Back Into Matrix

›
Online gaming password stealers form a large malware category. Moreover, it is growing: there is strong demand in the virtual experience, th...
Saturday, January 16, 2010

Trojan.Hydraq - Part II

›
Previous post described the installation process of the trojan and its backdoor commands. Now it's time to inspect its connection detai...
Wednesday, January 13, 2010

Trojan.Hydraq Exposed

›
The post describes functionality (static analysis) of the trojan that was reported in the recent targeted attacks against some large compan...
›
Home
View web version
Powered by Blogger.