http://blogs.mcafee.com/mcafee-labs/tro ... us-offense
McAfee discovered Reveton :roll:
McAfee discovered Reveton :roll:
A forum for reverse engineering, OS internals and malware analysis
Xylitol wrote:http://blogs.mcafee.com/mcafee-labs/tro ... us-offenseI thought this one was kind of unique (variant with runctf.lnk).
McAfee discovered Reveton :roll:
thisisu wrote:The ransom screen does not appear if no network connection is detected (even in Normal Mode). I'm guessing the author finds no reason for victim to type in moneypak codes if there is no internet connection to transmit the data back to himself/herself. :?It is more simple than you think. If it cannot establish connection with C&C it is unable to download scary page and render it in browser window as the next startup stage. So this code is simple stuck in infinite wait.
¤¤¤ Entrees de registre : 8 ¤¤¤
[STARTUP][Rans.Gendarm] runctf.lnk @christophe : C:\Windows\System32\rundll32.exe|C:\Users\CHRIST~1\wgsdgsdgdsgsd.exe,H1N1 -> SUPPRIMÉ
[HJ DLL][Rans.Gendarm] HKLM\[...]\ControlSet001\Services\winmgmt\Parameters : ServiceDll (C:\Users\christophe\wgsdgsdgdsgsd.exe) -> REMPLACÉ (C:\windows\system32\wbem\WMIsvc.dll)
Tigzy wrote:Anyone got the latest version of H1N1?I have requested some files in live topics on my forum, when I have the samples I will upload these here.
C:\Users\Steffi\wgsdgsdgdsgsd.dll (Trojan.FakeMS) -> Succesvol in quarantaine geplaatst en verwijderd.
C:\ProgramData\dsgsdgdsgdsgw.pad (Exploit.Drop.GSA) -> Succesvol in quarantaine geplaatst en verwijderd.
C:\Users\Steffi\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runctf.lnk (Trojan.Ransom.SUGen) -> Succesvol in quarantaine geplaatst en verwijderd.
C:\Windows\System32\rundll32.exe C:\Users\Acer\wpbt0.dll,H1N1
C:\Windows\System32\rundll32.exe c:\users\jan\wgsdgsdgdsgsd.dll,H1N1
"path"="C:\\Users\\username\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\runctf.lnk"MD5: 868918982cb43a9c763160c30b69d09b
"command"="C:\\Windows\\System32\\rundll32.exe c:\\users\\username\\appdata\\local\\temp\\wlsidten.dll,H1N1"