Archived Blog

Storm Worm and Botnet Analysis

10.31.2008 - 1:52 PM

A few months ago, we wrote a paper that dissects the inner workings of a Storm Worm sample.

In the paper, Jun Zhang explains:
  • The custom packer and encryption used in the executable
  • The rootkit techniques
  • The peer-to-peer botnet and spamming component

Please send us your thoughts. We'd love to hear from you.

Click here to download the PDF white paper

Visit our Threat Resource Center page to access our many research reports, white papers, presentations, and podcasts, and to stay informed of what's brewing in the world of Web threats.
Bookmark This Post: