A forum for reverse engineering, OS internals and malware analysis 

Search found 19 matches: zombie

Searched query: zombie

 Go to advanced search

Re: Win32/Betabot (alias Neurevt)

 by EP_X0FF ¦  Sun Sep 22, 2013 5:41 am ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121552

... injecting itself in every newly started process. As it hooks NtOpenProcess in every injected process you can't simple kill this explorer.exe zombie. Adverted AntiRovnix is based on NtCreateFile handler where it monitors for DR(X) write access at boot sector. As for removal (even considering ...

Re: Win32/Kelihos

 by unixfreaxjp ¦  Fri Aug 09, 2013 4:55 pm ¦  Forum: Malware ¦  Topic: Win32/Kelihos (+Waledac downloader) ¦  Replies: 94 ¦  Views: 137982

... spot new Kelihos domains, in .RU,.SU,.COM or anything, we sack them down. Please help the effort to clean up the botnet, don't let them becoming a zombie P2P botnet used by these scums, every effort to shut their system means a lot! Have faith! #MalwareMustDie!

Re: Trojan:Win32/Reveton

 by EP_X0FF ¦  Thu Dec 13, 2012 3:53 am ¦  Forum: Malware ¦  Topic: Win32/Reveton ¦  Replies: 150 ¦  Views: 198804

... launched again on different specially created desktop (name random). H1N2 export called via rundll32.exe from Reveton mapped code inside IEXPLORE zombie process. Because of using different desktops this trojan is very comfortable for dynamic analysis. Autoruns via Start->Programs->Autorun. Terminates ...

Re: Bot sample for unknown

 by EP_X0FF ¦  Mon May 28, 2012 2:08 am ¦  Forum: Malware ¦  Topic: Backdoor Bot (including unnamed IRC bots) ¦  Replies: 13 ¦  Views: 12011

... Data\[randomchars] Runs through HKCU\Software\Microsoft\Windows\CurrentVersion\Run Log from keylogger is near the dropper. To removal - terminate zombie svchost (it is simple to find it - it parent will be explorer) and explorer in same time. Cleanup registry entry + delete dropper with folder. ...

Re: Malware Requests

 by retrogad ¦  Mon May 07, 2012 4:51 pm ¦  Forum: Malware ¦  Topic: Malware using svchost ¦  Replies: 4 ¦  Views: 4754

... ,or enter values in registry that belongs only to system files,or simply damage svchost file Oficla aka myloader? IIRC it was using svchost.exe zombie process for payload download. everything will be good! can u tell plz where to get working CONFICKER ? (conficker --- > i have tried to execute ...

Re: Malware Requests

 by EP_X0FF ¦  Mon May 07, 2012 4:20 pm ¦  Forum: Malware ¦  Topic: Malware using svchost ¦  Replies: 4 ¦  Views: 4754

... ,or enter values in registry that belongs only to system files,or simply damage svchost file Oficla aka myloader? IIRC it was using svchost.exe zombie process for payload download.

Inline patching problem.

 by lorddoskias ¦  Sat Sep 17, 2011 8:18 pm ¦  Forum: Newbie Questions ¦  Topic: Inline patching problem. ¦  Replies: 24 ¦  Views: 18386

... ADDR instructions DWORD blockSize = 0; DWORD instSize; //count how many bytes we actually have to overwrite without thrashing the system //uses zombie dissasm engine while(blockSize < bytesToOverwrite) { GetInstLenght((PDWORD)((PBYTE)Addr + blockSize), &instSize); blockSize += instSize; } //allocate ...

Re: NgrBot (aka Win32/Dorkbot.gen!A)

 by EP_X0FF ¦  Wed Sep 07, 2011 3:12 pm ¦  Forum: Malware ¦  Topic: NgrBot (aka Win32/Dorkbot.gen!A) ¦  Replies: 71 ¦  Views: 79663

Two stage decryption/uncompressing process with hardcoded VM detection on board, zombie process spawning and memory injects. And finally inside the same primitive crap Main reasons: - you stupid cracker - you stupid cracker... - you stupid cracker?! yes detection ...

Worm:Win32/Yimfoca

 by Evilcry ¦  Sat May 08, 2010 7:44 am ¦  Forum: Malware ¦  Topic: Worm:Win32/Yimfoca ¦  Replies: 2 ¦  Views: 5892

... Windows directory to stay undetected by users. medium Joins IRC Network: The executable connects to an IRC network, most probably functioning as a zombie in a botnet. high Performs File Modification and Destruction: The executable modifies and destructs files which are not temporary. high Spawns ...