A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #1402  by EP_X0FF
 Sat Jul 03, 2010 1:47 pm
Symantec Win32.Unruy!gen1
A-squared Trojan-Clicker.Win32.Cycler.ajsx!A2
AVG Trojan horse Downloader.Generic9.CAXD or trojan horse clicker.AJRO
Avast Win32:Cycler-l[trj] or Win32:Cycler-G [Trj]
Malwarebytes Trojan.cycler
ESET a variant of Win32/TrojanDownloader.Unruy.BV trojan
Kaspersky Trojan-Clicker.win32.cycler.ajtp or Win32:Cycler-F [Trj]
SAS Trojan.Agent/Gen-Blarsa
Got something for you :) See attach, no analysis was done.

http://www.virustotal.com/analisis/cd9a ... 1278164650
Attachments
pass: malware
(19.59 KiB) Downloaded 134 times
 #11443  by R136a1
 Sun Feb 05, 2012 5:35 pm
Hey there,

the development of Whistler Bootkit hasn't stopped as I thought.

Here we have a blogpost claiming that they found a new Whistler varaint ITW (November 2011):
http://labs.bitdefender.com/?post_type=post&p=807

Unfortunately they don't want to provide a sample (I asked) or a hash of the aforementioned variant.

Has anybody a sample of this new Whistler? Driver? Dropper?