I am looking following sample . Help on samples will be highly appreciated .
http://www.securelist.com/en/blog/20819 ... ted_Attack
http://www.securelist.com/en/blog/20819 ... ted_Attack
A forum for reverse engineering, OS internals and malware analysis