[Vol-users] Howdy

Brett Cunningham brettcu at gmail.com
Wed Jan 9 07:37:23 CST 2013

Hi Julian,

     I am not intimately familiar with Rustock, but it seems that the
Rustock.C variant still lives on disk but it hooks itself into ntfs.sys's
IRP handlers which allows it to "lie" to any calls to functions inside that
driver. So when a program (from operating system components or userland)
says "give me file X", Rustock.C will return the clean copy of the file
instead of the infected one.

     From what I see, Rustock.C is available in both memory and on disk, it
just takes knowing what you are looking for in order to find it. Like most
commodity malware, there have been a number of controlled infections by
researchers to lead to the observation of the behavior.

- jbc22

On Tue, Jan 8, 2013 at 1:50 PM, Julian Brown <julian at jlbprof.com> wrote:

> Please forgive my noobness.
> I am new to Volatility and just viewed a discussion on memory acquisition
> problems and the malware removing itself from the memory before it was
> written to file for later analysis.
> Does malware such as Rustock.C leave any traces behind such as portions of
> the program used to "remove" itself from memory but cannot completely
> remove itself?
> Of if not, how do the researchers know it was present?  Did they do a
> controlled infection and watch it remove itself by other means?
> Thanx
> Julian
> ______________________________**_________________
> Vol-users mailing list
> Vol-users at volatilityfoundation.org
> http://lists.volatilesystems.**com/mailman/listinfo/vol-users<http://lists.volatilityfoundation.org/mailman/listinfo/vol-users>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.volatilityfoundation.org/pipermail/vol-users/attachments/20130109/cfa0ee26/attachment.html

More information about the Vol-users mailing list