A forum for reverse engineering, OS internals and malware analysis 

Search found 19 matches: zombie

Searched query: zombie

 Go to advanced search

Re: ntUnmapViewOfSection vs dll injection approach

 by EP_X0FF ¦  Thu Aug 25, 2016 3:13 pm ¦  Forum: Newbie Questions ¦  Topic: ntUnmapViewOfSection vs dll injection approach ¦  Replies: 5 ¦  Views: 9991

Oh you mean zombie process. The only benefit is AV/FW bypass. This applies to the use of any non-CreateRemoteThread methods.

Re: PbBot bootkit (alias Plite, GBPBoot)

 by R136a1 ¦  Fri Jun 24, 2016 11:41 am ¦  Forum: Malware ¦  Topic: PbBot bootkit (alias Plite, GBPBoot) ¦  Replies: 22 ¦  Views: 29159

Hi folks, here is a fresh sample from 2016. After a brief comparison it shows there are only some minor updates, presumably for compatibility reasons. However, I haven't checked in detail. Strings from 16-bit loader: -------------- ReadInitData ------------ ------- IsPMSInstalled ------------- C:\Wi...

Re: Variant of Zbot

 by pwnslinger ¦  Fri Feb 12, 2016 5:15 pm ¦  Forum: Malware ¦  Topic: Kronos ¦  Replies: 24 ¦  Views: 54913

... for ZBot it "decryption" based on moment when RunPE executed. Set break on CreateProcess and dump memory region it will attempt to write to the zombie target process. https://www.virustotal.com/en/file/e4e01da314f121f01094db8758880e6c8000cd54aabaee6eac60a436954616d9/analysis/1448537374/ "Unpacked" ...

Re: Variant of Zbot

 by pwnslinger ¦  Thu Dec 03, 2015 8:07 pm ¦  Forum: Malware ¦  Topic: Kronos ¦  Replies: 24 ¦  Views: 54913

... for ZBot it "decryption" based on moment when RunPE executed. Set break on CreateProcess and dump memory region it will attempt to write to the zombie target process. https://www.virustotal.com/en/file/e4e01da314f121f01094db8758880e6c8000cd54aabaee6eac60a436954616d9/analysis/1448537374/ "Unpacked" ...

Re: Variant of Zbot

 by EP_X0FF ¦  Thu Nov 26, 2015 11:33 am ¦  Forum: Malware ¦  Topic: Kronos ¦  Replies: 24 ¦  Views: 54913

... for ZBot it "decryption" based on moment when RunPE executed. Set break on CreateProcess and dump memory region it will attempt to write to the zombie target process. https://www.virustotal.com/en/file/e4e01da314f121f01094db8758880e6c8000cd54aabaee6eac60a436954616d9/analysis/1448537374/ "Unpacked" ...

Win32/Poweliks

 by EP_X0FF ¦  Tue Jul 15, 2014 10:44 am ¦  Forum: Malware ¦  Topic: Win32/Poweliks ¦  Replies: 36 ¦  Views: 113160

... removal and for hiding actual run value (regedit cannot handle incorrect value name and cancels listing items). Malware payload dll inside dllhost zombie process additionally works as a watchdog and will recover malware startup registry values if they are removed. Detection and Removal instructions: ...

Re: Win32/Betabot (alias Neurevt)

 by EP_X0FF ¦  Mon Sep 23, 2013 3:16 am ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121533

TheExecuter wrote:
As it hooks NtOpenProcess in every injected process you can't simple kill this explorer.exe zombie
it hooks 64bit processes also? if not then procexp-64 could get it.
It has tools blacklist inside, including sysinternals. Bot just wow64 compatible, not x64.

Re: Win32/Betabot (alias Neurevt)

 by TheExecuter ¦  Sun Sep 22, 2013 9:42 pm ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121533

As it hooks NtOpenProcess in every injected process you can't simple kill this explorer.exe zombie it hooks 64bit processes also? if not then procexp-64 could get it. Innovative injection technique(s) allow bypassing most antivirus HIPS solutions. found this advert, ...

Re: Win32/Betabot (alias Neurevt)

 by Thanat0S ¦  Sun Sep 22, 2013 10:11 am ¦  Forum: Malware ¦  Topic: Win32/Betabot (alias Neurevt) ¦  Replies: 59 ¦  Views: 121533

... injecting itself in every newly started process. As it hooks NtOpenProcess in every injected process you can't simple kill this explorer.exe zombie. Adverted AntiRovnix is based on NtCreateFile handler where it monitors for DR(X) write access at boot sector. As for removal (even considering ...