Introduction
After our previous analyses of the malware Red October available here:
- http://code.google.com/p/malware-lu/wiki/en_malware_redoctober
- http://code.google.com/p/malware-lu/wiki/en_malware_redoctober2
- http://code.google.com/p/malware-lu/wiki/en_malware_redoctober3
We decided to understand the protocol used by this malware. After understanding the protocole we made a short C&C using python.
read more......http://code.google.com/p/malware-lu/wiki/en_malware_redoctober_cc