Attachments
(118.83 KiB) Downloaded 67 times
A forum for reverse engineering, OS internals and malware analysis
[main]
version=0.03
aid=30040
sid=0
builddate=351
rnd=1229272821
[inject]
*=cmd.dll
* (x64)=cmd64.dll
[cmd]
srv=hxxps://lo4undreyk.com/;hxxps://sh01cilewk.com/;hxxps://cap01tchaa.com/;hxxps://kur1k0nona.com/;hxxps://u101mnay2k.com/
wsrv=hxxp://gnarenyawr.com/;hxxp://rinderwayr.com/;hxxp://jukdoout0.com/;hxxp://swltcho0.com/;hxxp://ranmjyuke.com/
psrv=hxxp://crj71ki813ck.com/
version=0.15
3. Please do not post identical samples and links to out-dated information about TDL4If you not sure what sample do you have - please do the small initial analysis (in VM/Sandbox etc) instead of just attaching it here. There is nothing new in TDL4 copy-pasted version for a long time, so there is no sense in samples of the same kind. VT scan results always will be entertainment because everybody knows that signatures and so-called generic detections/heur simple sucks.
Blur wrote:I think this probably affects DisableDriverSigning bcd entry, to stop windows cracks from working.http://blogs.technet.com/b/srd/archive/ ... dates.aspx
The second advisory, KB 2506014, hardens Windows against kernel-mode rootkits. This specifically breaks the hiding mechanism used by the current Alureon/TDL4 rootkit family. It is an optional update available on WU and WSUS.
Blur wrote:I think this probably affects DisableDriverSigning bcd entry, to stop windows cracks from working.I don't think so. WinPE mode must allows unsigned drivers otherwise Microsoft would break many things. I think they fixed how Winload.exe is loading kernel and its dependencies (kdcom.dll, hal.dll, bootvid.dll) by forcing it to load only signed drivers not matter what says the BCD configuration.