Thanks. And what about ntdll.dll/kernel32.dll from infected machine, can you attach them too?
Ring0 - the source of inspiration
A forum for reverse engineering, OS internals and malware analysis
EP_X0FF wrote:Thanks. And what about ntdll.dll/kernel32.dll from infected machine, can you attach them too?I no longer have access to the machine that those two files came off of, however the next machine that myself or my colleagues come across with this infection, I'll make sure to grab them and post them here.
dwmapi.dll ntmarta.dll /a /c vu open http://decryption routine
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1) GET HTTP/1.0
Host: Content-Length: Pragma: no-cache
User-Agent: Host: type=renderer ntdll.dll kernel32.dll
shell32.dll ws2_32.dll
ole32.dll Imagehlp.dll Software\Microsoft\Windows\CurrentVersion\Explorer\LowRegistry
Software\Microsoft\Windows NT\CurrentVersion\Temp
SYSTEM\CurrentControlSet\Services\sr\Parameters
SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun DisableSR \user32.dll /m.php
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup [%subid] <d> </d> <u> </u> <a> </a> <c> </c> google.com Date: X55Fut2999 ?subid= &id= \user32.dll TimeGetWork Uses32 Domen Data / & \ PROCESSOR_IDENTIFIER ? &os= &flg= &ver= &pr= \MicrosoftNT \winserver.exe 11expl22 11svch22 19792079 sfc_os.dll win winlogon.exe dllcache\winlogon.exe svchost.exe dllcache\svchost.exe explorer.exe dllcache\explorer.exe user32.dll opera.exe \SysWoW64 \wbem\ C: \ s y s p r e p \ c r y p t b a s e . d l l c r y p t b a s e . d l l cryptbase.dll \sysprep sysprep.exe elev.exe
00000021 decryption_loop:
00000021 xor [edi], dl
00000023 inc edx
00000024 cmp edx, 0FFh
0000002A jbe continue
0000002C mov edx, 0
00000031
00000031 continue:
00000031 add edi, 1
00000034 loop decryption_loop
TeamRocketOps wrote:Hey guys. I am looking for a Bamital dropper that drops this svchost infected file:
Win32/Bamital.Q (alias Tojan.Kordeef)
MD5: 7c4efffec2a73c88ebbffdbcd369cde6 (and any other recent droppers if possible)
https://www.virustotal.com/file/4a7b6f8 ... /analysis/
Thank you in advance!
:D
dcmorton wrote:Believe this to be another Bamital.Q infection; low detection on VT however.They were all cured already by AV. PE rebuilt, EP restored and virus code filled with zeroes.