rkhunter wrote:Can you share link to VBR or VT report for this previous MaxSS version?
This picture from your post you linked previously demonstrates routine responsible for I/O operations with malicious components, including vbr. It is equal to previously used by MaxSS, as well as multiple debugger checking, antivm. For sample refer to my old post, it's already crypter free, search for DeviceIoControl and IOCTL
http://www.kernelmode.info/forum/viewto ... 9031#p9031 The dropper itself have been redesigned to obfuscate code flow as you mentioned.
Btw, if it's identical why Alureon.K detect for him appeared?
Well, you can find lots of different detections for sinowal for example. Alone itself it does not indicate anything. As I posted before I want to hear any updates from Erik, since he started this and probably he can share more info.
kmd wrote:EP_X0FF wrote:Previous MaxSS did the same. Almost byte in byte :)
what do you mean? request spoilers!
Spoilers? What if I wrong? No spoilers :D But I see nice picture. Really fun :D Could be wrong however.