-
-
[原创]ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code
-
发表于: 2009-10-2 05:45 1755
-
[原创]ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code
2009-10-2 05:45
1755
Hi mates,
drum rolls, this is the first tutorial, under arteam flag, of a guy you probably already know. Evilcry wrote this interesting journey into the reversing of a modern malware.
Trojan-GameThief.Win32.Magania, according to Kaspersky naming convention, monitors the user activities trying to obtain valuable information from the affected user, especially about gaming login accounts. This long tutorial analyze this malware but is also a general document explaining how to analyze a modern nested-dolls malware.
I think you'll like this document.
take it here:
http://www.accessroot.com/arteam/site/download.php?view.313
drum rolls, this is the first tutorial, under arteam flag, of a guy you probably already know. Evilcry wrote this interesting journey into the reversing of a modern malware.
Trojan-GameThief.Win32.Magania, according to Kaspersky naming convention, monitors the user activities trying to obtain valuable information from the affected user, especially about gaming login accounts. This long tutorial analyze this malware but is also a general document explaining how to analyze a modern nested-dolls malware.
I think you'll like this document.
take it here:
http://www.accessroot.com/arteam/site/download.php?view.313
赞赏
他的文章
- [求助][ARTeam] Analyzing an Adobe Flash Malware (CVE-2011-2110) by +NCR/CRC! 6314
- [原创]ARTeam: new forum 2350
- [原创]ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code 1756
- [原创]ARTeam: [ARTUT] Introduction To Malware Techniques and Logics Part 1 2731
- [原创]ARTeam: Armag3ddon 1.6f by condzero 4826
看原图
赞赏
雪币:
留言: