A forum for reverse engineering, OS internals and malware analysis 

Forum for completed malware requests.
 #14047  by rkhunter
 Sun Jun 17, 2012 6:19 pm
gigaz wrote:looking for Virus.Boot.Azusa.f (according to Kaspersky Lab), do not have any particular hash
This is detection of infected MBR.
 #14054  by tachion
 Sun Jun 17, 2012 6:56 pm
gigaz wrote:hello

looking for Virus.Boot.Azusa.f (according to Kaspersky Lab), do not have any particular hash, here some short info from Kaspersky aswell:
http://www.securelist.com/en/descriptio ... ot.Azusa.a
please :)

https://www.virustotal.com/file/4d6e7ee ... /analysis/
Attachments
password: infected
(736 Bytes) Downloaded 66 times
 #14058  by tachion
 Sun Jun 17, 2012 7:12 pm
rkhunter wrote:
tachion wrote:please :)
Sure?...by kaspersky this is Virus.Boot.Flame.b

hmm
100% I do not know :)
Emsisoft - Virus.Boot.Azusa! IK
 #14059  by rkhunter
 Sun Jun 17, 2012 7:31 pm
tachion wrote:
rkhunter wrote:
tachion wrote:please :)
Sure?...by kaspersky this is Virus.Boot.Flame.b
hmm
100% I do not know :)
Emsisoft - Virus.Boot.Azusa! IK
Think that such malware request by AV-detect wrong and it result may be same uncertain.
 #14063  by gigaz
 Sun Jun 17, 2012 8:47 pm
I got the infected MBR attached from an infected PC, but i need the dropper
Attachments
pw= infected
(138.34 KiB) Downloaded 67 times