Some fresh ZeroAccess for collection.
This dropper is cross-platform. It contains both x86 and x64 malware versions.
In attach dropper, some decrypted stuff, driver-loader, infected driver and rootkit hidden volume dump.
Also notice special svchost process with \\.\globalroot\Device\svchost.exe\svchost.exe path, fake, real points to \Device\Svchost.exe special device created by second rootkit driver (disk access to it results in program termination and file execution block). Some sort of active antidetection trick used long time before in original MaxPlus backdoor.
This time it kills some security permissions for file. This can be reverted back through File->Security page.
Code: Select all if (NT_SUCCCESS( ZwOpenFile(&Handle, 0x40000u, &ObjectAttributes, &IoStatusBlock, 7u, 0) ))
{
ZwSetSecurityObject(Handle, 4u, &SecurityDescriptor);
ZwClose(Handle);
}