3 weeks later. This is all you need to know about modern AV "industry" of fake-AV's and "security" companies investigating "state sponsored" APT script-kiddie shit and bin-diffing MS patches.
Even in static scan they failed. Note nothing is crypted here.
Callback address plugin - as downloaded (despite the fact they are resource only dlls they still part of ZeroAccess)
https://www.virustotal.com/en/file/0491 ... 453792440/ (2/53) ZERO correct names
https://www.virustotal.com/en/file/2e6a ... 453792458/ (2/53) ZERO correct names
Callback address plugin - as loaded in memory
https://www.virustotal.com/en/file/1df9 ... /analysis/ (0/44) Nothing
https://www.virustotal.com/en/file/0ea4 ... 453792638/ (0/54) Nothing
Tracker plugin - as downloaded
https://www.virustotal.com/en/file/f8ad ... 453792463/ (2/54) 1 correct names
https://www.virustotal.com/en/file/7f1d ... 453792469/ (1/53) ZERO correct names
Tracker plugin - as loaded in memory and executed
https://www.virustotal.com/en/file/b56e ... 453792647/ (6/54) 2 correct names
https://www.virustotal.com/en/file/0f7c ... /analysis/ (3/53) 1 correct detection
UAC bypass dll - as loaded and executed in memory
https://www.virustotal.com/en/file/2e27 ... 453792497/ (5/54) 2 correct names
P2P dlls - more correct detections just because these modules share > 50% of code with previous version of ZeroAcceess
https://www.virustotal.com/en/file/949d ... 453792487/ (30/53) 10 correct names
https://www.virustotal.com/en/file/3700 ... 453792513/ (29/53) 10 correct names
Dropper itself (again more detection because it share most of the code with previous ZeroAccess version)
https://www.virustotal.com/en/file/7bab ... 453792475/ (43/53) 15 correct names
Dropper as it executed
https://www.virustotal.com/en/file/6a62 ... 453792480/ (33/46) 6 correct names
Remembering these autists from Phallus Group who investigated Delphi Rombertik for a few months it is clearly that: when malware is litte bit complicated than usual dotnet or zeus crap and what is most important - can be used for company marketing purposes - then it is called APT. When it more complicated than average AV "analyst" can understand - then it is not malware, so dgaf about it.