A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #983  by EP_X0FF
 Tue May 04, 2010 1:34 pm
I believe this is simple bug. VmWare scsi driver incompatible with SCSI requests used by RootRepeal. In my tests it always list first sectors, because it simple can't read them through vmware miniport driver.
 #992  by gjf
 Wed May 05, 2010 12:37 pm
VMWare - cannot boot because of MBR damage. Chance to load last successful / Safe Mode and with any choose - again and again.
 #1013  by t4L
 Fri May 07, 2010 3:06 am
I believe other passthru IOCTL is enough to detect this creature.
 #1016  by gjf
 Fri May 07, 2010 8:09 am
Try one of the following:
malware
infected
virus


Actually I am using a script with these standard ones and have no idea which exactly worked well :)
 #1017  by __Genius__
 Fri May 07, 2010 8:23 am
Yes, it's "infected".
vt result : 32/41
Code: Select all
http://www.virustotal.com/analisis/464d963f698ee0a385a983c5b88b1c2ba3243ebb776e8f205def48d7aac348d7-1273191636
seems not stealth as well in case of real-time file system scan with anti-virus systems.
 #1018  by obse
 Fri May 07, 2010 11:13 am
__Genius__ wrote:Yes, it's "infected".
vt result : 32/41
Code: Select all
http://www.virustotal.com/analisis/464d963f698ee0a385a983c5b88b1c2ba3243ebb776e8f205def48d7aac348d7-1273191636
seems not stealth as well in case of real-time file system scan with anti-virus systems.
it's stealth... but you have to wait about 3 minutes when it activate rootkit :)
authors trying to hook ObpParseSymbolicLink (not on all systems they have success) and this is critical for OS, so they didn't found "good" solution and
set timeout to give a chance to system to initialize self :)