EP_X0FF wrote:tested with TDSSKiller from KL.Yes, we are working on it.
after reboot infection is alive.
A forum for reverse engineering, OS internals and malware analysis
EP_X0FF wrote:tested with TDSSKiller from KL.Yes, we are working on it.
after reboot infection is alive.
Blitskrieg wrote:Good to know, obviously it is not a big problem to adopt TDSSKiller for this new release.EP_X0FF wrote:tested with TDSSKiller from KL.Yes, we are working on it.
after reboot infection is alive.
windbreaker11 wrote:After finding the random driver, simply disable it in Registry (Start value 4) and reboot. It takes the random drive offline and u can replace it on reboot. Then re-enable it (Start value 0). Works pretty well until they get an automated way.What about drivers that are critical for OS load?
Blitskrieg wrote: What about drivers that are critical for OS load?
wealllbe20 wrote: goto HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\(drivername)Good solution in two reboots if we have backup of these system drivers of course :)
copy the same driver,but clean driver to c:\windows\system32\driver\(randomname.sys)
ImagePath=(put your copied good driver here(randomname.sys))
reboot
delete original atapi.sys or whatever the driver is .
copy (randomname.sys) to atapi.sys or whatever the driver name is.
change ImagePath in the registry, whalla