A forum for reverse engineering, OS internals and malware analysis 

Forum for completed malware requests.
 #24993  by leeno
 Mon Jan 19, 2015 6:08 am
Help of below mentioned samples will be highly Appreciated

1.

Details = http://www.microsoft.com/security/porta ... /Spoolis.A
md5 = 22a3b108ceb279a8da395bd02956008e79391c85


2.

Microsoft Name = Ransom:Win32/Criakl.C

Details = http://www.microsoft.com/security/porta ... kl.C#tab=2


3 .

http://www.microsoft.com/security/porta ... ki.Q#tab=2

MD5 = 68cb0604fb9297ef2668909aa9a4b264

4.
Microsoft name = TrojanDownloader:Win32/Badiehi.A

Details http://www.microsoft.com/security/porta ... /Badiehi.A
 #25009  by Blaze
 Tue Jan 20, 2015 3:11 pm
leeno wrote:Help of below mentioned samples will be highly Appreciated

1.

Details = http://www.microsoft.com/security/porta ... /Spoolis.A
md5 = 22a3b108ceb279a8da395bd02956008e79391c85
Not found

2.

Microsoft Name = Ransom:Win32/Criakl.C

Details = http://www.microsoft.com/security/porta ... kl.C#tab=2
Criakl samples attached, no Criakl.C variant though

3 .

http://www.microsoft.com/security/porta ... ki.Q#tab=2
MD5 = 68cb0604fb9297ef2668909aa9a4b264
Attached

4.
Microsoft name = TrojanDownloader:Win32/Badiehi.A

Details http://www.microsoft.com/security/porta ... /Badiehi.A
Badiehi.A samples attached
Enjoy.
Attachments
(3.09 MiB) Downloaded 51 times