Page 3 of 10
Re: Malware Requests
PostPosted:Fri Apr 29, 2011 12:53 pm
by 23kid
Re: Malware Requests
PostPosted:Fri Apr 29, 2011 1:03 pm
by markusg
im searching this:
Tejon Crypter v1 5 Extreme Edition
http://www.hackcommunity.com/Thread-RDG ... ition-2011
Re: Malware Requests
PostPosted:Fri Apr 29, 2011 4:22 pm
by Xylitol
thekillergreece wrote:Anyone have Windows Security Suite like that
and want serial too
i want answer and thanks
Here you go:
http://www.kernelmode.info/forum/viewto ... =120#p5932
"i want"
Lol ?
----------------------
markusg wrote:im searching this:
Tejon Crypter v1 5 Extreme Edition
http://www.hackcommunity.com/Thread-RDG ... ition-2011
I've only found Tejon Crypter v1.2 Private Edition, hope that can help you.
HWID protected, execute it in vm.
Re: Malware Requests
PostPosted:Fri Apr 29, 2011 5:01 pm
by Xylitol
test this, dropped exe from pc_update2_284.exe.ViR
Re: Malware Requests
PostPosted:Fri Apr 29, 2011 5:05 pm
by markusg
at first thx.
i also found this
but searching the 1.5 version, so perhaps somebody have it, its not so important, so i can wait
Re: Malware Requests
PostPosted:Wed May 18, 2011 6:36 am
by vyosek
Have you somebody sample of malware, which makes this
OTL wrote:
< reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv" /v ImagePath /c >
! REG.EXE VERSION 3.0
HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\WUAUSERV
IMAGEPATH REG_EXPAND_SZ %fystemroot%\system32\svchost.exe -k netsvcs
< reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS" /v ImagePath /c >
! REG.EXE VERSION 3.0
HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\BITS
IMAGEPATH REG_EXPAND_SZ %fystemRoot%\system32\svchost.exe -k netsvcs
RSIT wrote:O23 - Service: Služba inteligentního přenosu na pozadí (BITS) (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Automatické aktualizace (wuauserv) - Unknown owner - C:\WINDOWS\
Re: Malware Requests
PostPosted:Thu Jun 02, 2011 12:43 pm
by tomatto007
I am looking for the sample
MD5: 898584A8772095181E0461A1F8A7DD4C
or similar
http://www.threatexpert.com/reports.asp ... XE&x=0&y=0
Re: Malware Requests
PostPosted:Mon Jun 06, 2011 8:59 am
by ramesh
hi,
Check the below link for Fake AV
http://www.megaupload.com/?d=HWV7XZQ5
password: infected
Re: Malware Requests
PostPosted:Mon Jun 06, 2011 10:00 am
by ramesh
hi,
i am looking for the sample
a) D420047137948B0765B875055325ECCE
b)
http://www.threatexpert.com/report.aspx ... 055325ecce
and
a)84D4539AB661E9222343415625BA4BF3
b)
http://www.threatexpert.com/report.aspx ... 5625ba4bf3
Re: Malware Requests
PostPosted:Fri Jul 15, 2011 6:41 pm
by Sotherbee
Hello! Looking for earlier versions of trojan.pornoblocker /pinkblocker (Trojan-Ransom.Win32.PinkBlocker.*).
http://habreffect.ru/files/a09/b30763d0 ... ture_1.png
something like that )