Blog

ATI Botnet November 2015 Update Released to Strike Center

November 24, 2015 by Ixia Blog Team

Ixia ATI is happy to release our monthly botnet package covering November 2015, which can be downloaded from Strike Center here: https://strikecenter.ixiacom.com/bps/botnets.

The package contains the following list of botnet strikes:

  • Win32.Backdoor.Sulunch
  • Win32.Adware.Casino-36
  • Android.Trojan.Agent.c
  • Win32.Backdoor.Ziyazo.A
  • Win32.Backdoor.Delf
  • Android.Trojan.Pubiz.a
  • Win32.Trojan.BitCoinMiner.A
  • Win32.Adware.BetterSurf
  • Win32.Backdoor.Tohwen.A
  • Win32.Downloader.Kuluoz.D-2
  • Win32.BankingTrojan.Bankeiya.A-2
  • Win32.Downloader.Egamipload.A
  • Win32.Backdoor.Rumsoot.A
  • Win32.Backdoor.Darkddoser.A
  • Win32.Adware.InstallMonetizer-2
  • Android.Spyware.FakeTimer.A
  • Win32.PasswordStealer.Sacanph.A
  • Win32.Trojan.Obfuscator.XZ
  • Win32.Downloader.Delf.QUT
  • Win32.Trojan.Kovter.B-2
  • Win32.Backdoor.Morix.B
  • Win32.ScareWare.FakeRean-2
  • Win32.Downloader.Dluca.ax-2
  • Win32.Backdoor.Gimmiv.A
  • Win32.Backdoor.Fynloski.A
  • Win32.Backdoor.Hupigon.nkor
  • Win32.Backdoor.PcClient.B
  • Win32.Downloader.Siromost.A
  • Win32.Downloader.Banload-2
  • Win32.Backdoor.Pontoeb.G
  • Win32.Trojan.luhe_fiha
  • Linux.Backdoor.Tsunami.L-2
  • Win32.Bot.Gamarue-2
  • Win32.Downloader.Upatre.A
  • Win32.Virus.OnLineGames_IK
  • Win32.Trojan.Nadeomi.A
  • Android.Backdoor.Twoser
  • Win32.Trojan.Managee.A
  • Android.Spyware.Dougalek.A
  • Win32.Trojan.Sinis.C
  • Win32.Worm.Sality
  • Win32.ScareWare.FakeScanti
  • Win32.Backdoor.Mask.A-2
  • Win32.Trojan.Agent.ueiy
  • Android.Trojan.GingerMaster.J
  • Win32.Trojan.Tyleny.A
  • Android.Trojan.FakeInstaller.bubblepop
  • Android.Trojan.Extension.A
  • Win32.Backdoor.Lamin.A
  • Win32.Trojan.Jolob.A

Please see the release notes for more details on this update.

Register at /signup/ati-alerts to receive email notifications of what is new in the bi-weekly updates to Ixia’s Application and Threat Intelligence (ATI) program.

Additional Resources: