lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: randnut at hotmail.com (first last) Subject: MyDoom download info. >BTW, apparently there is a yet undiscovered bug in MyDoom.B code >that prevents it from spreading effectively. Much of the code is >encrypted, so dissecting processes sowly. It's still UPX packed, but it won't unpack with "UPX -d" because the author used a simple UPX scrambler. Either undo what he did or unpack it manually and you'll see all the code. The easiest way for anyone inexperienced with this is just to dump the memory to a file when the virus is running. But you don't think the anti-virus companies already know everything about this virus? It's been a few days now and they should've found out everything they needed to know the very same day they got their first copy of MyDoom.B. _________________________________________________________________ Let the new MSN Premium Internet Software make the most of your high-speed experience. http://join.msn.com/?pgmarket=en-us&page=byoa/prem&ST=1
Powered by blists - more mailing lists