Samples.
Attachments
66 items - Password : infected
(7.11 MiB) Downloaded 102 times
(7.11 MiB) Downloaded 102 times
A forum for reverse engineering, OS internals and malware analysis
fixrogues wrote:But I get error that not a valid 32 application. Could somebody help me? If this is not the right place to post, I apologize.They are dlls.
EP_X0FF wrote:Yes, they are. I got the error when I renamed them to .exe and that was my mistake. How can I make these dlls run and actually lock my computer? Any help would be appreciated.fixrogues wrote:But I get error that not a valid 32 application. Could somebody help me? If this is not the right place to post, I apologize.They are dlls.
fixrogues wrote:7db987f299b86ab8913c8de716f79296 from the above pack as example.EP_X0FF wrote:Yes, they are. I got the error when I renamed them to .exe and that was my mistake. How can I make these dlls run and actually lock my computer? Any help would be appreciated.fixrogues wrote:But I get error that not a valid 32 application. Could somebody help me? If this is not the right place to post, I apologize.They are dlls.
I tried searching the internet for how to run dlls as application but didn't find anything. I see that there is some "Code" in several posta. I copied that code, placed the files in appropriate locations, changed the username and tried to run the command using "Run" in windows to no joy.
7db987f299b86ab8913c8de716f79296 from the above pack as example.Thanks! It worked and I got the lock screen. Two questions :
Rundll32 dllname,exportname
Export names are random.
As for sample I just decrypted it, and executed as rundll32 C:\decrypted.dll,H1N1 and got my lock screen. Take it and try.
fixrogues wrote:1. How can I know which export names are going to working with different files?No how, brute force them. They called (during initial infection) from loaders or (as I assume) from shellcode. Usually there two exported names. If there no alive C&C they will do nothing (maybe this changed in current Reveton version, idk).
2. When you say "I just decrypted it", It means that you unzipped the folder and renamed the hash file to .dll?It meant I unzipped it, loaded into debugger, did a little tracing, dumped reveton container from rundll32 memory to file, corrected result binary if it needed. I doubt you can do this without basic knowledge of reverse-engineering.
fixrogues wrote:Thanks! It does sound a little complicated. I'll try to figure this out and If you know some kind of tutorial online on this topic, please direct me to that. Thanks a lot for all the help!Well if you want to deal with malware as researcher, you will have to learn it anyway.
EP_X0FF wrote:fixrogues wrote:Thanks! It does sound a little complicated. I'll try to figure this out and If you know some kind of tutorial online on this topic, please direct me to that. Thanks a lot for all the help!Well if you want to deal with malware as researcher, you will have to learn it anyway.
http://www.kernelmode.info/forum/viewto ... ?f=13&t=31