EP_X0FF wrote:Not everything with ZeroAccess string is ZeroAccess malware and not every ZeroAccess malware has ZeroAccess string inside.True, but the certificate was back to normal after formatting the machine .... Thanks for your input, as always.
A forum for reverse engineering, OS internals and malware analysis
EP_X0FF wrote:Not everything with ZeroAccess string is ZeroAccess malware and not every ZeroAccess malware has ZeroAccess string inside.True, but the certificate was back to normal after formatting the machine .... Thanks for your input, as always.
3. If everything fine it additional memory pages in Explorer.exe memory and maps another shellcode here, causing "n" to be loaded inside Explorer.exe. "n" includes "desktop.ini" component inside as raw data.You mean "services.exe" instead, right?
Tigzy wrote:No I mean shellcode with LdrLoadDll AFAIR in the context of Explorer.exe3. If everything fine it additional memory pages in Explorer.exe memory and maps another shellcode here, causing "n" to be loaded inside Explorer.exe. "n" includes "desktop.ini" component inside as raw data.You mean "services.exe" instead, right?
Quads wrote:Here is the 3rd services.exe MD5 I know of attached
Quads
thisisu wrote:MD5: c6e73a75284507a41da8bef0db342400Unpacked container in attach. Notice few additional modules (e32, e64, w32, w64)
https://www.virustotal.com/file/be00ef4 ... /analysis/
EP_X0FF wrote:Services.exe infection code identified :)Nice! Looking forward to your analysis :)