Author Topic: Review of Rootkit.TmpHider  (Read 2828 times)

0 Members and 1 Guest are viewing this topic.

July 13, 2010, 04:35:29 pm
Read 2828 times

SysAdMini

  • Administrator
  • Hero Member

  • Offline
  • *****

  • 3335
http://www.wilderssecurity.com/attachment.php?attachmentid=219888&d=1279012965

Quote
Propagation method
You should take into consideration that virus infects Operating System in unusual way (without
usage of autorun.inf file) through vulnerability in processing lnk-files.
So you just have to open infected USB storage device using Microsoft Explorer or any other file
manager that can display icons ( for example Total Commander ) to infect your Operating System
and allow execution of malware program.

...

Quote
Note that drivers are signed with digital signature of Realtek Semiconductor Corp
Ruining the bad guy's day

July 16, 2010, 08:29:01 am
Reply #1

SysAdMini

  • Administrator
  • Hero Member

  • Offline
  • *****

  • 3335
Ruining the bad guy's day