How the TLD4 rootkit gets around driver signing policy on a 64-bit machine
http://sunbeltblog.blogspot.com/2010/11 ... river.html
http://sunbeltblog.blogspot.com/2010/11 ... river.html
A forum for reverse engineering, OS internals and malware analysis
frank_boldewin wrote:How the TLD4 rootkit gets around driver signing policy on a 64-bit machineLol, you're completly wrong ! Read MS article at last
http://sunbeltblog.blogspot.com/2010/11 ... river.html
[main]TDL path evolution:
version=3.0
botid=f8eae8b1-c356-4f04-a4e4-780e866e8ff2
affid=10064
subid=0
installdate=15.11.2010 11:51:37
[injector]
svchost.exe=tdlcmd.dll
*=tdlwsp.dll
[tdlcmd]
servers=https://h3456345.cn/;https://h9237634.c ... 7.174.173/
ASCII "\\?\globalroot\Device\Ide\IdePort1\stbdvbvp\stbdvbvp\tdlwsp.dll" -->> TDL3.0
ASCII "\\?\globalroot\dpqnbsft\ioyxvpji\tdlcmd.dll" -->> TDL3.273
ASCII "\\?\globalroot\device\00000219\5d3885c0\cmd.dll" -->> TDL4.03
markusg wrote:http://www.file-upload.net/download-297 ... 3.rar.htmlPatches System files and drops a whole lot of crap.
http://www.virustotal.com/file-scan/rep ... 1289932860
PX5 wrote:http://www.virustotal.com/file-scan/rep ... 1290107388Hi,
[main]TDL4.03 Files attached.
version=0.03
aid=30002
sid=0
builddate=4096
rnd=1336601894
[inject]
*=cmd.dll
* (x64)=cmd64.dll
[cmd]
srv=https://rukkeianno.com/;https://kangoji ... 6b6b6.com/
wsrv=http://skolewcho.com/;http://jikdooyt0. ... yjuke.com/
psrv=http://cri71ki813ck.com/
version=0.15
markusg wrote:http://www.file-upload.net/download-297 ... 3.rar.htmlDrops just about everything. Rooters, virut and fake MSE alert.
http://www.virustotal.com/file-scan/rep ... 1289932860