Tigzy wrote:What do you mean by "protected by .net" ?It depends from the mscoree.dll (look IAT) that means .net app.
A forum for reverse engineering, OS internals and malware analysis
Tigzy wrote:What do you mean by "protected by .net" ?It depends from the mscoree.dll (look IAT) that means .net app.
Tigzy wrote:Yes, that's a .net binary, but why "protected"? By this, I understand either packed or protected with rootkit functionalitiesCrypter.
markusg wrote:SHA256:Same as http://www.kernelmode.info/forum/viewto ... 234#p14234
ee45297630678b7c628411ab133e23559e9867feb7f1277efada39f41a94d100
File name:
ALIAS.exe
https://www.virustotal.com/file/ee45297 ... 340631497/
rkhunter wrote: youtube.ex1Regards to this dropper.
MD5: c4a946cc851e2ee6407c2c8c9680cf18
SHA1: ae641cb785644297f7bb34ea58e19fc826f1132a
Attribute: #8Dll1, cutted from driver (in attach):
Type: 0xC0 $(REPARSE_POINT)
Length: 0xA0
Resident flag: resident
Name length: 0x0
Name offset: 0x0
Flags: 0x0
Instance (id): 0x8
Body length: 0x82
Body offset (from attr record): 0x18
Resident flag: 0x0
\.\globalroot\systemroot\system32\mswsock.dllDll2, cutted from driver (in attach):
WSPStartup
\\.\%08x\U\80000032.@
ntdll.dll
VirtualAlloc
LoadLibraryA
LoadLibraryW
GetProcAddress
FreeLibrary
VirtualFree
KERNEL32.dll
MD5Init
MD5Update
MD5Final
ADVAPI32.dll
INBR64.dll
AcceptEx
\\?\globalroot\systemroot\system32\mswsock.AcceptEx
GetAcceptExSockaddrs
\\?\globalroot\systemroot\system32\mswsock.GetAcceptExSockaddrs
NSPStartup
\\?\globalroot\systemroot\system32\mswsock.NSPStartup
TransmitFile
\\?\globalroot\systemroot\system32\mswsock.TransmitFile
WSPStartup
getnetbyname
\\?\globalroot\systemroot\system32\mswsock.getnetbyname
inet_network
\\?\globalroot\systemroot\system32\mswsock.inet_network
\BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D79}Forged afd.sys in attach.
\BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D77}
\systemroot
\\.\%08x\U\%08x.@
\??\%08x\@
\??\%08x\U
????????.@
%08x.@
%08x.$
%08x.~
Microsoft Base Cryptographic Provider v1.0
RtlExitUserThread
ZwOpenFile
ZwQueryVolumeInformationFile
ZwClose
RtlImageNtHeader
MSWSOCK.dll
WSASocketW
WSAIoctl
WSARecv
WSASend
WSASendTo
WSARecvFrom
WS2_32.dll
markusg wrote:https://www.virustotal.com/file/924823e ... /analysis/Sirefef with rootkit and x64 backdoor. Unpacked attached. Posts moved.