R33N
October 16th, 2013, 19:42
No problem.
I did not want to be real extensive as I could only assume your knowledge on the subject might already been extensive and that is why you are asking a targeted question like that.
Some assumptions I made based on your first question:
You are looking to do it for application testing and are performing extensive application reversing of Trusteer similar to the reversing on Kaspersky in the past for vulnerability analysis and exploitation then obviously you shouldn't admit it and awesome

.
You are looking to identify malware samples that try to evade Trusteer and how they accomplish this task.
So some ideas from the top of my head. Most banker specimens work to filter Trusteer through the static webinjection techniques while they are filtering your browser communications. Some common ones I have seen out there performing this are Zeus, Citadel, Cridex, Ursnif.
If you are looking for your own malware test bed testing just grab a Zeus variant control panel and builder, create your own injects for the purpose of bypassing Trusteer products. You can get ideas from other webinjects and configs out on Pastebin or other places which you probably troll through already.
This would not even be suggesting malware that is using a filter driver or at ring 0 and filtering communications at this level.
Both ideas would be a fun little research projects from a malware perspective and I am sure that malware authors in the past have worked through this process many times to accomplish the goal of evading Trusteer like many other anti-malware solutions.
To enumerate some banker trojans delivery chains off the top of my head would be:
Redkit Exploit Kit -----> Citadel (Before Takedown)
Kulouz Downloader -----> Citadel (After Takedown)
Blackhole Exploit Kit (/controlling/) -----> Zeus P2P (Might be changing if Paunch is really arrested. Seen them pushing email deliveries within recent months more commonly)
Neutrino Exploit Kit -----> Ursnif
Blackhole (/ngen/) -----> Caphaw
Zeus/Spyeye Tracker could also be used
If you want to trade ideas, samples, etc. for anything like this let me know as I always enjoy little side projects like this from an offensive/defensive perspective. I am always looking to learn.