Nytro Posted November 24, 2014 Report Posted November 24, 2014 Regin: Top-tier espionage tool enables stealthy surveillanceSymantec Security ResponseVersion 1.0 – November 24, 2014OVERVIEW...................................................................... 3Introduction................................................................... 5Timeline.......................................................................... 5Target profile.................................................................. 6Infection vector........................................................ 6Architecture................................................................... 8Stage 0 (dropper)..................................................... 9Stage 1...................................................................... 9Stage 2...................................................................... 9Stage 3...................................................................... 9Stage 4............................................................ 11Stage 5.................................................................... 11Encrypted virtual file system containers ?????????????? 11Command-and-control operations......................... 12Logging................................................................... 12Payloads....................................................................... 1464-bit version............................................................... 15File names.............................................................. 15Stage differences................................................... 15Conclusion.................................................................... 16Protection..................................................................... 16Appendix...................................................................... 18Data files................................................................ 18Indicators of compromise............................................ 20File MD5s................................................................ 20File names/paths.................................................... 20Extended attributes............................................... 21Registry.................................................................. 21Download: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf Quote