A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #13740  by Quads
 Tue Jun 05, 2012 11:19 pm
Not all the time and that includes the desktop.ini files due to the likes of services.exe in behind it all. ESET online scan finds just in the memory as sirefef.EZ

Quads
 #13742  by B-boy/StyLe/
 Tue Jun 05, 2012 11:31 pm
Quads wrote:Not all the time and that includes the desktop.ini files due to the likes of services.exe in behind it all. ESET online scan finds just in the memory as sirefef.EZ

Quads
I agree. However by using BlitzBlank this should allow Combofix to run properly to finish the job.
FRST is a great alternative indeed.


Regards,
Georgi
 #13744  by B-boy/StyLe/
 Wed Jun 06, 2012 12:27 am
thisisu wrote: I haven't used BlitzBlank before. Do you find it more effective than Avenger?

Hi,


I would not compare these two since I find both of them to be pretty good.
However, I found that BlitzBlank is very useful against ZA and Bamital (deleting and replacing explorer.exe and winlogon.exe) from my experience.
I resolved a couple of cases thanks to it. :)


Regards,
Georgi
 #13747  by B-boy/StyLe/
 Wed Jun 06, 2012 3:47 am
Gabethebabe wrote:malware case update

I ran MBAM with latest sigs - nothing
I ran hitmanpro - it found some irrelevant vundo stuff, ate some cookies and flagged SearchFilterHost.exe as suspicious, but that file resulted to be legit.

I can't run OTL on the infected system - it halts during the scan.

So all tools are breaking their teeth on this zaccess variant aorn

Hi,

Have you noticed from where FRST was started?
Code: Select all
Running from C:\Users\JonEJet\Downloads
Not from a PE environment...

Also this should be the oldest variant:
Code: Select all
C:\Windows\$NtUninstallKB46020$
Break the junction and delete the folder.



Regards,
Georgi
  • 1
  • 4
  • 5
  • 6
  • 7
  • 8
  • 56