Endpoint Protection

 View Only

A Paper on Waledac 

Sep 01, 2009 03:48 PM

Over the past few weeks a series of blog entries were published about W32.Waledac:

Waledac – an Overview

Waledac, Part 2: Its Bootstraps and Armor

Waledac, Part 3: A Spammer, Downloader, and Infostealer – Among Other Things

If you are interested you can download a Waledac paper, posted here, which presents information on Waledac’s functionalities, possible origins, spam campaigns, and protection mechanisms. There is also more detail on Waledac’s communication protocol and task messages. The paper is based on a blog series and a threat analysis report that was published on the DeepSight portal in June 2009.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.