Nytro Posted May 8, 2011 Report Posted May 8, 2011 TDL3: The Rootkit of All Evil?Account of an Investigation into a Cybercrime GroupAleksandr Matrosov, senior virus researcherEugene Rodionov, rootkit analystContentsDOGMA MILLIONS CYBERCRIME GROUP ............................................................................................... 3DOGMA MILLIONS ....................................................................................................................................... 3THE DROPPER ...................................................................................................................................... 8DETECTING VIRTUAL MACHINE ENVIRONMENT ..................................................................................................... 8CHECKING LOCALES ...................................................................................................................................... 9INSTALLING KERNEL MODE DRIVER .................................................................................................................. 10Using AddPrintProcessor and AddPrintProvidor API ........................................................................... 10Using known dlls ............................................................................................................................... 13THE ROOTKIT ..................................................................................................................................... 15INFECTION ................................................................................................................................................ 15READING AND WRITING DATA FROM/TO HARD DISK ............................................................................................ 19HOW TO SURVIVE AFTER REBOOT .................................................................................................................... 21INJECTING MODULES INTO PROCESSES .............................................................................................................. 22ENCRYPTED FILE SYSTEM ..................................................................................................................... 22INJECTOR ........................................................................................................................................... 25COMMUNICATION PROTOCOL ........................................................................................................................ 26TASKS ..................................................................................................................................................... 27APPENDIX A ....................................................................................................................................... 28APPENDIX B ....................................................................................................................................... 29APPENDIX C ....................................................................................................................................... 30APPENDIX D ....................................................................................................................................... 31Download:http://www.eset.com/us/resources/white-papers/TDL3-Analysis.pdf Quote