In the paper, Jun Zhang explains:
- The custom packer and encryption used in the executable
- The rootkit techniques
- The peer-to-peer botnet and spamming component
Please send us your thoughts. We'd love to hear from you.
Click here to download the PDF white paper
Visit our Threat Resource Center page to access our many research reports, white papers, presentations, and podcasts, and to stay informed of what's brewing in the world of Web threats.