Jump to content
Nytro

TDL3: The Rootkit of All Evil?

Recommended Posts

Posted

TDL3: The Rootkit of All Evil?

Account of an Investigation into a Cybercrime Group

Aleksandr Matrosov, senior virus researcher

Eugene Rodionov, rootkit analyst

Contents
DOGMA MILLIONS CYBERCRIME GROUP ............................................................................................... 3
DOGMA MILLIONS ....................................................................................................................................... 3
THE DROPPER ...................................................................................................................................... 8
DETECTING VIRTUAL MACHINE ENVIRONMENT ..................................................................................................... 8
CHECKING LOCALES ...................................................................................................................................... 9
INSTALLING KERNEL MODE DRIVER .................................................................................................................. 10
Using AddPrintProcessor and AddPrintProvidor API ........................................................................... 10
Using known dlls ............................................................................................................................... 13
THE ROOTKIT ..................................................................................................................................... 15
INFECTION ................................................................................................................................................ 15
READING AND WRITING DATA FROM/TO HARD DISK ............................................................................................ 19
HOW TO SURVIVE AFTER REBOOT .................................................................................................................... 21
INJECTING MODULES INTO PROCESSES .............................................................................................................. 22
ENCRYPTED FILE SYSTEM ..................................................................................................................... 22
INJECTOR ........................................................................................................................................... 25
COMMUNICATION PROTOCOL ........................................................................................................................ 26
TASKS ..................................................................................................................................................... 27
APPENDIX A ....................................................................................................................................... 28
APPENDIX B ....................................................................................................................................... 29
APPENDIX C ....................................................................................................................................... 30
APPENDIX D ....................................................................................................................................... 31

Download:

http://www.eset.com/us/resources/white-papers/TDL3-Analysis.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...