Skip navigation.
Home

Malware

Needed - malicious PDF files

|

I need a few malicious .pdf file(s). The file(s) should be less than 10mb in size. any help is appreciated.

Looking for some Malware sample and RAT

|

Hello friends
I am new here. I am looking for a working malwares(trojans/bot) with the initials AARC, PXR and RB and also finding a good Remote Administration Tool(RAT).
If anyone have any sample please help me.

Sample of UltraDefragger Scareware

| | | |

Anybody with sample of misleading app, UltraDefragger ?

Reversing the source of the ZeroAccess crimeware rootkit

| |

We recently undertook a project to update the hands-on labs in our Reverse Engineering Malware course, and one of our InfoSec Resources Authors, Giuseppe "Evilcry" Bonfa, defeated all of the anti-debugging and anti-forensics features of ZeroAccess and traced the source of this crimeware rootkit:

Part 1

InfoSec Institute would classify ZeroAccess as a sophisticated, advanced rootkit. It has 4 main components that we will reverse in great detail in this series of articles. ZeroAccess is a compartmentalized crimeware rootkit that serves as a platform for installing various malicious programs onto victim computers. It also supports features to make itself and the installed malicious programs impossible for power-users to remove and very difficult security experts to forensically analyze.

New Feed Alliance Created

Hi Guys,

i want to announce that our new malware feeds alliance was lunched. http://c300g.net.
we are open for feeds exchange for the solely purpose of research.

we already have 8 different vendors which we all ready exchanging data with, we also work with 6 different sensors deployed around several different geographical hosting services.
we have more the 8,000,000 samples all ready.

we will lunch Dissect||PE Smart threat analysis framework on January 1. 2011.

Bamital Request

|

Looking for a sample of Bamital.A dropper. It infects explorer.exe and winlogon.exe/wininit.exe (depending on OS).

Example of infected explorer.exe http://www.virustotal.com/file-scan/report.html?id=6191e8ab71204520bb081815ff8c645ba32a3e836100ee0c5ba5994aea739789-1289354715

Looking for Torpig, also known as Sinowal or Anserin command and control and builder

|

Looking into how torpig talks to its command and control.
I would appreciate a sample if possible.

Looking for Belmoo sample

|

md5: E8EAD7641F68822C8FBFE53AD7F1BF52

SHA1: 244860D5C40D8D13C16FA8BBA133C7608A09A276

Tracing the palevo cnc server

|

Anyone noted and working related to cnc server in internet:IP:109.196.130.66

i success to pretend as bot and connect to that cnc server but just can see myself only.

Searching Belmoo

|

Halo!

Does anyone have sample of new BDS/Belmoo.A,Backdoor.Belmoo or W32/Belmoo.A?

More infomation:
http://techblog.avira.com/2010/10/27/new-firefox-exploit-in-the-wild/en/
http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-102700-2143-99&tabid=2
http://norman.com/security_center/virus_description_archive/129146/

Syndicate content