A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #8968  by Vrtule
 Wed Oct 05, 2011 12:05 pm
Hello,

I am now searching for some malware samples that hide registry keys (especially from kernelmode, bud registry objects hiding by user mode hooking is also ok) to do some test with them. I have already used good old Rustock B sample.

Does anybody have samples of this type in his/her malware collection? I do not want to abuse the malware, I need it only for research/testing purposes.

Thanks in advance
 #8969  by EP_X0FF
 Wed Oct 05, 2011 12:08 pm
UM SpyEye
KM Dncat, Bubnix aka NewRest/Rustock/Rustock.D (AFAIR), BlackEnergy2, TDL2

all samples posted on this forum use search
 #9122  by EP_X0FF
 Thu Oct 13, 2011 11:59 am
Speaking about "legitimate" software which behaves like rootkit I may recommend to take a look on nProtect GameGuard. It is very unfriendly kernel mode rootkit based L2 game protection. Few years ago I was working on it bypassing with Fyyre :)

However, in case of topic subject sptd itself is not malware of course.
 #9123  by rkhunter
 Thu Oct 13, 2011 1:46 pm
Lineage 2 has very extreme and agressive protection, even uses exploit for installing driver in system, as I saw. Perhaps even StarForce driver can not be compared with it.