Главная
Study mode:
on
1
Introduction
2
Overview
3
Last year
4
Zebrocy timeline
5
Zebrocy implant
6
Spearfish
7
Second stage implants
8
AutoIT
9
Delphi
10
CSharp
11
Canon Backdoor
12
Delphi payload
13
Embassy
14
Decompiler
15
Whats next
Description:
Explore the intricacies of Zebrocy, a unique APT group, in this 25-minute conference talk by Kurt Baumgartner, principal security researcher at Kaspersky's Global Research and Analysis Team. Delve into the group's distinct characteristics that set it apart from Sofacy and BlackEnergy. Examine the Zebrocy timeline, implant strategies, and spearphishing techniques. Analyze various second-stage implants, including AutoIT, Delphi, C#, and the Canon Backdoor. Investigate the Delphi payload and its connection to embassy targets. Learn about decompiler techniques and gain insights into potential future developments in this Russian-speaking threat actor's activities.

Zebrocy’s Multi-Language Malware Salad

Kaspersky
Add to list