Hi Ade,
thanks for the sample.
It is downloading Digital Protection executable from 91.212.127.19.
Seems to be previously this crap was named "Malware Defense". Looks like parody on NOD32 lol.
It contains dll that performs hooking (splicing method) of CreateProcessW function in explorer.exe
Replaces standard Windows Security Center with it's own fake.
Keeps connection with ns.km30339.keymachine.de
Digital protection folder :)
Size 7.35 Mb, with some mp3 files.
pass: malware
http://www.megaupload.com/?d=DX9BBM00
thanks for the sample.
It is downloading Digital Protection executable from 91.212.127.19.
Seems to be previously this crap was named "Malware Defense". Looks like parody on NOD32 lol.
It contains dll that performs hooking (splicing method) of CreateProcessW function in explorer.exe
Replaces standard Windows Security Center with it's own fake.
Keeps connection with ns.km30339.keymachine.de
Digital protection folder :)
Size 7.35 Mb, with some mp3 files.
pass: malware
http://www.megaupload.com/?d=DX9BBM00
Ring0 - the source of inspiration