Malware analyzed by me in the beginning of this year. Contains specific code against Rootkit Unhooker <= 3.8 (last available version is unaffected) and IceSword, see dump for more info.
Primitive trojan using AppInit_Dll's key for WINMM.dll loading (because it's loading codecs) and setting itself as multimedia codec in registry:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Drivers32
value: midi9 c:\auxspy.dll
to be loaded into address space of newly created processes.
Contains only one interesting thing inside - blacklist of security software. Because user32.dll initializes a lot of crap (including AppInit) trojan code executed before application entry point and able to kill application if it matches built-in signature.
Below is dump of blacklist.
Primitive trojan using AppInit_Dll's key for WINMM.dll loading (because it's loading codecs) and setting itself as multimedia codec in registry:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Drivers32
value: midi9 c:\auxspy.dll
to be loaded into address space of newly created processes.
Contains only one interesting thing inside - blacklist of security software. Because user32.dll initializes a lot of crap (including AppInit) trojan code executed before application entry point and able to kill application if it matches built-in signature.
Below is dump of blacklist.
wininet.dll ws2_32.dll\ntdll.dll //fHqq Referer:When injected trojan dll rebased at specific (auto-calculated?) address, worker thread created.
SS: Host: TSYSCHECK RKHDRV software\microsoft\windows nt\currentversion\ AppInit_DLLs winmm.dll windows drivers32 midi9 BINRES Antirootkit guardxup. .pif
location: custom http://www.google. http://www.bing.com search.yahoo. search rds.yahoo yimg acl .bat .reg cmd reged /windows nt/ HTTP/1.0 302 Found
Content-Length: 0
Location: AntiMcHTNOD3LIVEPand<UA COMOESS CAUpLiveNortSpySEnigAVPUTMUFAdobSUPEMpCo IceSword Malwarebytes format=rss c.atdmt.com .googlehosted.com mcafee clamav prevx pandasecurity avir kaspersky bitdefender drweb .eset. sophos symantec onecare
Attachments
pass: malware
(190.19 KiB) Downloaded 90 times
(190.19 KiB) Downloaded 90 times
Ring0 - the source of inspiration