A forum for reverse engineering, OS internals and malware analysis 

Forum for completed malware requests.
 #8789  by shaheen
 Tue Sep 27, 2011 11:09 pm
http://blog.eset.com/2011/09/27/towering-qbot-certificates

any sample of this?

Thanks
 #8810  by p4r4n0id
 Wed Sep 28, 2011 6:39 pm
Hi,
I am looking for the Mac Flashback Sample. MD5 is 893173D0B12A6C6912FB6134DFECAA5B.

Thx,
p4r4n0id
 #9070  by suniljoseph
 Mon Oct 10, 2011 1:27 pm
Maxstar wrote:
suniljoseph wrote:Hi,
I am trying to get the installer for Win32/FakeScanti (Microsoft). It would be great if anyone could provide a sample which comes with TrojanDropper:Win32/Sirefef.B (zeroaccess) or W32/Katusha.

Malware name: Win32/FakeScanti
Short description of malware you want (optional), link to AV site/article etc describing malware
http://www.2-spyware.com/remove-av-guard-online.html
AV Guard Online
http://www.kernelmode.info/forum/viewto ... 9015#p9015
Thanks for pointing that out :) . That looks like the dropped file. I am trying to get my hand on the dropper too.
 #9098  by Striker
 Wed Oct 12, 2011 12:58 am
Hey, im looking for a rogue called "WinHound"

here is a screenshot:

Image

If anyone does have other old rogue samples from the year 2007, 2008 etc..pls share :). thanks.
 #9104  by p4r4n0id
 Wed Oct 12, 2011 12:32 pm
Striker wrote:Hey, im looking for a rogue called "WinHound"

here is a screenshot:

Image

If anyone does have other old rogue samples from the year 2007, 2008 etc..pls share :). thanks.
MD5?
 #9114  by Striker
 Wed Oct 12, 2011 5:30 pm
p4r4n0id wrote:MD5?
unfortunately i cannot edit my post. here are the MD5.

Installer: winhoundinstaller.exe (2559 KB)
MD5: 49693FA15155B8B0B4EE5BB8135FD0B9
 #9325  by Gunnerofarsenal
 Thu Oct 20, 2011 10:10 pm
Flashback Mac OS X, very appreciated

MD5 hash of Flashback.C sample (actual .pkg): 041ec03a36598a9823fb342cd9840acc
MD5 hash of Flashback.C sample (postinstall): e24979f7bd55a458a33247c5201a6a7d
 #9489  by hnpl2011
 Tue Nov 01, 2011 4:26 am
A serious code injection vulnerability affecting timthumb, a popular image resize script used in many WordPress themes and plugins, has been exploited in recent months to compromise over 1 million Web pages.
more info:
http://www.binarymoon.co.uk/2011/08/timthumb-2/
http://www.infoworld.com/d/security/ser ... sed-177520
anyone get infected? check and post the sample here, thank :)
  • 1
  • 3
  • 4
  • 5
  • 6
  • 7
  • 10