Back to Results
First PageMeta Content



Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers. CYBER THREAT INTELLIGENCE REPORT April 2015 Follow us on twitter: @blueliv | https://twitter.com/blueliv Visit our blog: http://www.blueliv.com/blog
Add to Reading List

Document Date: 2015-04-22 07:31:18


Open Document

File Size: 4,17 MB

Share Result on Facebook

Company

Microsoft / the AES / encrypted using AES / /

IndustryTerm

automated analysis systems / installed software / decryption algorithm / domain generation algorithm / derivation algorithm / Internet Explorer / anonymous network / /

OperatingSystem

Microsoft Windows / XP / /

Person

Dridex Trojan / Dyre Trojan / /

Technology

peer to peer / P2P / virtual machine / cryptography / network protocol / Domain Generation Algorithms / Dyre domain generation algorithm / setup Key derivation algorithm / operating system / decryption algorithm / 11 Dridex communication encryption / 6 Dyre domain generation algorithm / networking protocol / 05 Network protocol / credentials Network protocol / Key derivation algorithm / 05 11 Network protocol / /

URL

http /