Guys, congrats for Sophos, it found ZeroAccess without rootkit http://nakedsecurity.sophos.com/2012/06 ... -usermode/
:o
:o
A forum for reverse engineering, OS internals and malware analysis
rkhunter wrote:Guys, congrats for Sophos, it found ZeroAccess without rootkit http://nakedsecurity.sophos.com/2012/06 ... -usermode/It's a nice article. Sophos is one of the blogs I enjoy reading the most. Very clear and concise.
:o
malwarian wrote:Hi guys,May be you safe remove CLSID key before? After reboot it would easy for delete files...
My job is malware removal.Any idea on removing C:\windows\assembly\gac_32\desktop.ini,C:\windows\assembly\gac_64\desktop.ini.
It gets hooked into every process,it returns back even after combofix deletes it,we are not allowed to use blitzbank ,OTL.Also no chance of using farbar recovery scan tool ( remote support )
thanks
malwarian wrote:Hi guys,You can use HitmanPro to remove this variant. Current build 156 removes the CLSID variant. We've released a Beta build that performs both the Removal and Repair in one single pass:
My job is malware removal.Any idea on removing C:\windows\assembly\gac_32\desktop.ini,C:\windows\assembly\gac_64\desktop.ini.
It gets hooked into every process,it returns back even after combofix deletes it,we are not allowed to use blitzbank ,OTL.Also no chance of using farbar recovery scan tool ( remote support )
thanks