A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #14496  by EP_X0FF
 Sat Jul 07, 2012 1:34 am
madshus wrote:
rkhunter wrote:He-he, with simple technique...just hang debugger on processes (including Kaspersky, Dr.Web, Avast and others).
What do you think why the bad guys install a rootkit while AVs are killed anyway?
In a hopeless attempt to prevent manual removal.
 #14497  by DWS94
 Sat Jul 07, 2012 2:38 am
rkhunter wrote: He-he, with simple technique...just hang debugger on processes (including Kaspersky, Dr.Web, Avast and others).
First suspend the process, And then in order to debugger permissions kill AV ?
Kaspersky self-protection Does not prevent himself is hang up ?
Kaspersky's HIPS module not prompt ? :?:
Thank
 #14517  by EP_X0FF
 Sun Jul 08, 2012 3:16 pm
First suspend the process, And then in order to debugger permissions kill AV ?
Kaspersky self-protection Does not prevent himself is hang up ?
Kaspersky's HIPS module not prompt ?
http://www.anti-malware-test.com/?q=taxonomy/term/16

Platinum Self-Protection Award

Image

Kaspersky Internet Security 2011 (100%)
 #18863  by EP_X0FF
 Sun Apr 07, 2013 11:10 am
Not sure about origin of this malware but mad skills level is the same. PWS OnlineGames equiped with driver agent performing dll injection and AV blacklisting.

Adds + 80 Mb to malware files as overlay.
C:\ProcessFilter\Driver\objfre\i386\ProcessFilter.pdb
Dropper + two extracted drivers attached. For a madskills and lols see driver entry.

+
PsTerminateSystemThread: 0x%08x PspTerminateThreadByPointer: 0x%08x PspTerminateThreadByPointer: 0x%08x Search_PspTerminateThreadByPointer Error
SHA256: 9a5fbbab260b5d75da342726b8a90de506a5bbcbc1326b5a383b4ee4c0e331f8
SHA1: 2951bd26017107670ae592e212fcd75c88b6ac15
MD5: 99f504f9e9010e0a32e609a08edfccc0

https://www.virustotal.com/en/file/9a5f ... /analysis/
Attachments
pass: infected
(223.76 KiB) Downloaded 36 times