Here is that MD5 services.exe attached
Quads
Quads
Attachments
password = infected
(160.32 KiB) Downloaded 68 times
(160.32 KiB) Downloaded 68 times
A forum for reverse engineering, OS internals and malware analysis
Quads wrote:Here is that MD5 services.exe attachedhttps://www.virustotal.com/file/e647717 ... 339402188/
Quads
dumb110 wrote:Nothing unusual about that detection ratio, same thing happened with the other MD5 on here, but now 8/42 do detect that one.Quads wrote:Here is that MD5 services.exe attachedhttps://www.virustotal.com/file/e647717 ... 339402188/
Quads
EP_X0FF wrote:We need ADS dump of this file from infected machine. The code injected by ZeroAccess seems to be working that way:What version of ZAccess your research belong?
Opens services.exe as file (FILE_READ_EA | FILE_WRITE_EA | SYNCHRONIZE), allocates ERW buffer with size of 0x10000, then calls ZwQueryEaFile for acquired handle and then checks returned length, if everything is fine it executes buffer @00000001000142EB. So if we are not failed somewhere in injected code analysis we assume services.exe contains specially named malware ADS lol
If anyone interested - please confirm :)
rkhunter wrote:What version of ZAccess your research belong?This is research based on FUD infected services.exe posted above.
Tigzy wrote:..."services.exe" and the CLSID variant are the sames?Usual Trojan:Win32/Sirefef.P not performs services.exe infection as I remember.
I'm not able to explain the infection mecanisms :/
the key is here for reboot survival, but what does the GAC PE stands for?