A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #22537  by unixfreaxjp
 Mon Mar 24, 2014 2:50 pm
Sirefef resurrected, date stamp 20/03/2014

Allow me to ask: The previous method to kill this botnet can be applied to fight him also in this round too, yes?
For security purpose you don't have to answer it if "yes".
 #22538  by EP_X0FF
 Mon Mar 24, 2014 3:12 pm
As long as this botnet have infrastructure over p2p it can be disrupted. ZeroAccess waited few months and resurrected as I believe in "test" mode (only one plugin in network) to see how quick the MS response may be delivered/created.
 #22578  by flyroom
 Thu Mar 27, 2014 2:32 am
EP_X0FF wrote:Is it currently in zeroaccess network? I'm asking because this is old z00clicker from oct 2013.
No, this plugin is not in za v2 now. From my latest crawling of za v2, there're only three functional plugins
 #22579  by flyroom
 Thu Mar 27, 2014 2:52 am
Updating in progress, another new plugin today, spreads on 16464 branch
btw, the plugin 800000CB on 16470 branch uploaded yesterday just disappeared, seems deleted by botmaster
password: infected
(7.62 KiB) Downloaded 72 times
 #22580  by EP_X0FF
 Thu Mar 27, 2014 4:22 am
It is 6 month old plugin from aug 2013.
I don't see anything new except two clickfraud modules.
  • 1
  • 49
  • 50
  • 51
  • 52
  • 53
  • 56