HI G33Ks,

Hope the below references will explore the behaviour and various
characteristics of a Malware.

Enjoy Learning.

STAGE - I
http://www.securelist.com/en/analysis/204792265/Red_October_Detailed_Malware_Description_1_First_Stage_of_Attack

STAGE - II
http://www.securelist.com/en/analysis/204792268/Red_October_Detailed_Malware_Description_2_Second_Stage_of_Attack

STAGE - III
http://www.securelist.com/en/analysis/204792264/Red_October_Detailed_Malware_Description_3_Second_Stage_of_Attack

STAGE - IV
http://www.securelist.com/en/analysis/204792273/Red_October_Detailed_Malware_Description_4_Second_Stage_of_Attack

STAGE - V
http://www.securelist.com/en/analysis/204792272/Red_October_Detailed_Malware_Description_5_Second_Stage_of_Attack


Cheers,
0xN41K

-- 
You received this message because you are subscribed to the Google Groups 
"NForceIT" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send an email to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to