lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4381CB95.2060501@angelofsin.net>
Date: Mon Nov 21 13:28:53 2005
From: derek at angelofsin.net (Derek)
Subject: Re: unknown windows rootkit

Your notes indicate you had trouble removing some registry entries.  I'd 
suggest running PSExec from Sysinternals.  It's free and comes with 
source from www.sysinternals.com, and the command would be something like:

 psexec /s /i /d c:\path\to\regedt32.exe

If you can't edit or delete those keys this way, I don't know of another 
tool that will let you without resorting to an offline registry editor.

>>We found what seems to be a unknown rootkit on a
>>customer system which was windows 2000 sp4.
>>It is a kernel resident infector as it installs itself as
>>hidden device driver operating in kernel level to hide
>>its directories and programs aswell as network connections.
>>For our research we named it Win32/McSport-A.
>>    
>>
>>More Detailed informations aswell as removal instructions
>>can be found here: http://www.groundzero-security.com/mcsport.html
>>    
>>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ