A forum for reverse engineering, OS internals and malware analysis 

Forum for completed malware requests.
 #27382  by frame4-mdpro
 Tue Dec 08, 2015 9:10 pm
billbudsocket wrote:I call bullshit. None of the 14 hashes from the report show up in VT.
Jeez, not all the malware is on VT you know, especially not the really "juicy" ones -- they even admit to this; I'd say they have about 70% give-or-take. There are a lot of occasions (read: malware campaigns) where malware samples do not appear on VT, period.
 #27384  by robemtnez
 Wed Dec 09, 2015 1:16 pm
billbudsocket wrote:I call bullshit. None of the 14 hashes from the report show up in VT.
372f1e4d2d5108bbffc750bb0909fc49 is the installer, the other hashes belong to resources obtained from the same malware. They won't upload anything to VT if the the investigation is still running.
 #27393  by rexor
 Thu Dec 10, 2015 10:18 pm
billbudsocket wrote:I call bullshit. None of the 14 hashes from the report show up in VT.
Just some notes, about the report from fireeye:
  • - No explanation about the way this thing does the installation.
    - FireEye does not share it
    - Nothing is not VT
    - The sample supports x64/x32 and is a bootkit
I'd guess there is some sort of zero-day inside the dropper/loader which could explain most of the above.
So, let's wait till the right time come for the share :-)
 #27394  by p1nk
 Fri Dec 11, 2015 3:36 am
With it being described as a threat that's been around for a while, it's strange to not have more public hashes.
 #27768  by EP_X0FF
 Thu Jan 28, 2016 4:55 am
Another crap from BIOS era. "Advanced by design". Closed and moved to completed.