exitthematrix wrote:Any idea about encryption after reading that post?
This key in below registry may help:
- HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Retalix\Security, or
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Retalix\Security
Code: Select allSecurity = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
But I need "data" or "traffic" to test decoding of this key.
Sice we cannot get the traffic in all tries,
the only way left is to reverse this sample the way he did to get the what-so-called "weird strings".
See the below quoted from the post:
And the most epic stuff, I found a weird string used by another crappy function after nopping to see what happened if the malware found something in RAM:
maybe it "sounds" like that.. I would be happy to see that "weird strings" values or just paste the Rx values,
(wasn't that difficult and not risky task to share anyway...and he didnt
)
which decodes in:
Oh, F(word) me! "What" to be decoded with "what" to burp these result??
If I may suggest please contact the writer and ask either the traffic data or memory register or that "weird strings" data from him,
because I won't spending more of my time on this with the so scattered details/info..
So many serious high risk infector out there which needed to be nailed too..than this empty cleaned up server..