text
stringlengths 4
429
|
---|
treated
|
authentication
|
into
|
botnet.
|
Once
|
authenticated,
|
victim
|
uses
|
following
|
check-
|
beacons:
|
HTTP
|
GET:
|
/search6[RndNum]?h1=[VictimId]
|
o Where
|
VictimId
|
same
|
string
|
identifying
|
victim
|
machine
|
previously
|
used
|
parameter
|
value.
|
User-
|
Agent:
|
Mozilla/5.0
|
(compatible;
|
Windows
|
5.2)
|
o Note
|
that
|
user-
|
agent
|
changed
|
hard-
|
coded
|
string
|
versus
|
using
|
encoded
|
system
|
name
|
initial
|
check-
|
Some
|
Trojan
|
functionality
|
includes:
|
Download
|
file
|
from
|
C&C:
|
o HTTP
|
GET:
|
/download7[RndNum]?h1=[VictimId]
|
Upload
|
file
|
C&C:
|
o HTTP
|
POST:
|
/upload8[RndNum]?h1=[VictimId]
|
Command
|
execution
|
response
|
C&C:
|
o HTTP
|
POST:
|
/search2[RndNum]?h1=[VictimId]
|
There
|
over
|
dozen
|
other
|
commands
|
identified
|
Trojan
|
listed
|
CyberESI
|
report.
|
September
|
2010
|
ISSNIP
|
Phishing
|
Email
|
with
|
Malicious
|
Attachment
|
days
|
later
|
following
|
previously
|
detailed
|
incident,
|
another
|
incident
|
with
|
information
|
publicly
|
available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.