A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #3096  by SecConnex
 Sat Oct 16, 2010 6:15 pm
I placed this in General Discussion, because it is only a suggestive idea.

What I thought of, is that for those that are somewhat beginner to intermediate malware fighters, having a rootkit parser would be a great tool.

Simply paste the ARK log in to the parser, and it will describe for the malware fighter what is going on in that line.

For example, in an RKU log, this: [1968]explorer.exe-->advapi32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x77DD1218-->00000000 [shimeng.dll]

Would translate to this in the parser: Import Address Table modification, {fileA} is hooked by {fileB}/{fileC}, with the read GetProcAddress.

Just an idea. :)