This document contains a summary of analysis of 5 malware suspects. Key details are provided on each suspect's files, compile times, command and control infrastructure, and behaviors. The analysis suggests the suspects originate from a French-speaking operator and involve use of Lua scripting. Attribution is difficult due to techniques like using commonly known bot names and hosting infrastructure in different countries.
26. Vulnerability Summary
for CVE-2011-4369
Original release date: 12/16/2011
Last revised: 01/29/2013
Source: US-CERT/NIST
http://blog.9bplus.com/analyzing-cve-2011-4369-part-one/