Home > slashdot > Taking Apart the Energizer Trojan

Taking Apart the Energizer Trojan

March 29th, 2010 03:10 admin Leave a comment Go to comments

iago-vL writes “Researchers at SkullSecurity have written a tutorial on how they reverse engineered the Energizer Trojan and generated an Nmap probe to remotely detect infections. The Energizer Trojan is a great educational tool because its inner workings are very simplistic, and it makes minimal efforts to hide itself or conceal its purpose; it even lists what appears to be the author’s name — ‘liuhong’ — in the source! The article provides an introduction to malware analysis, from infecting a test machine to debugging and disassembling the Trojan to writing the actual probe.”

Source: Taking Apart the Energizer Trojan

Related Articles:

  1. Energizer USB Battery Charger Software Infects PCs
  2. SMS Trojan Steals From Android Owners
  3. New Mac OS Trojan Produces BitCoins
  4. New Mac OS Trojan Produces BitCoins
  5. New Mac OS X Trojan Hides Inside PDFs
blog comments powered by Disqus
YOYOYOOYOYOYO