Full exposure of ZeroAccess in this PDF, including the backdoor details:
http://www.prevxresearch.com/zeroaccess_analysis.pdf
http://www.prevxresearch.com/zeroaccess_analysis.pdf
A forum for reverse engineering, OS internals and malware analysis
Brookit wrote:Interesting blog post about the new ZeroAccess variant:Yea, good article! And this things very interesting.
http://blog.webroot.com/2011/07/08/zero ... -tripwire/
Beside most facts EP_X0FF already mentioned, it contains an interesting discovery:
Interestingly enough, it also looks like the rootkit has a backdoor: If you run a file with a specific timestamp, PE checksum, and MajorOperatingSystemVersion and MinorOperatingSystemVersion properties, the rootkit will ignore the file. Such functionality could allow the rootkit’s creator to, for instance, run a custom tool that removes all trace of the rootkit code, which the rootkit itself will ignore.:D
kmd wrote:for me i note one strange thing
when every new rk discovered and posted the next few days this guy from Prevx drops article about it making an pr for his company.
maybe instead of lurking here mister Giuliani will finally register?
From the PDF:What is worth noting is that the malicious payload also corrupts the stack. So blocking the ExitProcess() has no point: the stack is corrupt and your process ends with an Access Violation. Nice way to kill of an AV. It might as well not do the ExitProcess at all and just jump straight to address 0x0 from the APC :?
... the rootkit driver allocates inside the target process 165 bytes of memory and injects there its malicious payload. Then, the code is executed by scheduling an APC. When executed from inside the target process space, the malicious payload walks the module list, looking for kernel32.dll. Then, it parses the export table and looks for the ExitProcess() Win32 API. When found, the payload calls the exit process function. By doing so, the rootkit forces the target process from killing itself ...
Flopik wrote:Is there a way to make a valid path for CreateFile with \Device\svchost.exe \svchost.exe ?
Maybe I need to add the SymbolicLink
Tell that bitch to be cool! Say 'bitch be cool'!<- authors loves Pulp Fiction.
EP_X0FF wrote:Overall it is 6 in 1. x86-x64 components in place, driver-killer in place.I don't think the paper solely contributed to the recent changes in ZeroAccess. Most recent changes are near impossible to make in a few days (since Eraser released his paper). I guess ZeroAccess authors had these in their pipeline for quite some time.
I didn't remember if this was in last sampleTell that bitch to be cool! Say 'bitch be cool'!<- authors loves Pulp Fiction.
for some unknown reason this incredible rootkit completely died after reboot leaving only driver-killer.
+ they made some little improvements, for some of them we can say thank you to mister Eraser :)