Need winlock's with webmoney
Who knows? :shock:
Who knows? :shock:
A forum for reverse engineering, OS internals and malware analysis
mrbelyash wrote:pass-virusPayload extract in %systemroot%/saliter.exe
code?
// Action script...
// [Action in Frame 1]
if (getBytesLoaded() >= getBytesTotal())
{
gotoAndPlay(5);
} // end if
// [Action in Frame 3]
if (getBytesLoaded() >= getBytesTotal())
{
gotoAndPlay(5);
} // end if
// [Action in Frame 4]
progress = int(getBytesLoaded() * 100 / getBytesTotal()) add "% - loading Flash...";
gotoAndPlay(3);
// [Action in Frame 19]
stop ();
// [Action in Frame 34]
stop ();
// [Action in Frame 49]
stop ();
// [Action in Frame 64]
stop ();
// [Action in Frame 79]
stop ();
// [Action in Frame 81]
stop ();
// [Action in Frame 96]
stop ();
// [Action in Frame 111]
stop ();
Xylitol wrote:Bad ;(mrbelyash wrote:pass-virusPayload extract in %systemroot%/saliter.exe
code?
exe file is powered by "Increditools Flash EXE Builder"
SWF File is dropped into %appdata%/IFViewer/[Random numbers]
i'm not a flash cracker pro but i've see nothing related to a serial check inside the flash file.
in attach the swf winlock.
Code: Select allthe 'Frame 81' is the bad boy.// Action script... // [Action in Frame 1] if (getBytesLoaded() >= getBytesTotal()) { gotoAndPlay(5); } // end if // [Action in Frame 3] if (getBytesLoaded() >= getBytesTotal()) { gotoAndPlay(5); } // end if // [Action in Frame 4] progress = int(getBytesLoaded() * 100 / getBytesTotal()) add "% - loading Flash..."; gotoAndPlay(3); // [Action in Frame 19] stop (); // [Action in Frame 34] stop (); // [Action in Frame 49] stop (); // [Action in Frame 64] stop (); // [Action in Frame 79] stop (); // [Action in Frame 81] stop (); // [Action in Frame 96] stop (); // [Action in Frame 111] stop ();
89162416577Runs through
89150032561
89160232860
89057024639
HKLM, HKCU SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ShellNot so aggressive like LockEmAll, but also annoying. Currently distributed through site with equal to LockEmAll pattern with Blackhole exploit kit embedded.
89162563189
89150306152
89150319790
CODE:004079B0 mov edx, offset _str_8901432.Text
CODE:004079B5 call @System@@LStrCmp$qqrv ; System::__linkproc__ LStrCmp(void)
CODE:004079BA jnz short loc_4079D7