BanMe
April 11th, 2011, 16:04
this is for the variant I found on a 'desktop' PC that protects its file and restarts itself 'upon process execution' is allows control panel to run..and 'services',this protection is very 'funny':rename a random exe on your desktop to the name of the 'protected' 'file' and then open it with 'olly' and then 'attach to the real malware'.. this may only work because of a theoretical bug in the 'rootkit that comes along with..The bug is aptly seen if you 'can' look.
from this location further analysis can be done.. I will send a copy as soon as I find that damn thumb drive..
This thing is brutal and very 'self' protective in a rootkit like fashion...it hides module names 'in memory' and 'files' on disc, and uses 'filters' with self defense being a key 'note'..I am going to try to 'find' the rootkit but, I doubt I will be able to..(I want to get closer to it, then just 'guessing' a bug in logic.
0: ) and want to see if I can..A accurate 'undamaged' sample 'follows' this damaged one.. "PLEASE never 'be' careful" 
from this location further analysis can be done.. I will send a copy as soon as I find that damn thumb drive..

This thing is brutal and very 'self' protective in a rootkit like fashion...it hides module names 'in memory' and 'files' on disc, and uses 'filters' with self defense being a key 'note'..I am going to try to 'find' the rootkit but, I doubt I will be able to..(I want to get closer to it, then just 'guessing' a bug in logic.

