According to S!Ri:
A new version of the multi-rogue scareware has been released. This malware is looking for the OS version (XP, Vista, Seven) and changes its name and skin: XP Anti-Spyware, XP Home Security 2011, XP Anti-Virus 2011 (...). It belongs to the Braviax family. As usual it displays fake warning messages to push users into buying a license.
According to VirusTotal this malware was detected by just 3 AntiVirus: https://www.virustotal.com/file-scan/report.html?id=24633ce7166264c99ebc5595494c44f6de5506091b8fa5e648f23245f6094268-1298037947
For me it was XP Total Security 2011:
XP Internet Security 2011:
XP Home Security 2011:
XP Home Security:
XP Anti-Virus 2011:
XP Anti-Spyware 2011:
To register (and help removal), copy paste this code: 1147-175591-6550
Braviax multi-rogue patcher:
.486
.model flat,stdcall
option casemap:none
include windows.inc
uselib MACRO libname
include libname.inc
includelib libname.lib
ENDM
uselib user32
uselib kernel32
rogue PROTO :DWORD,:DWORD,:DWORD,:DWORD
.data
Titre db "Braviax multi-rogue generic patch", 0
PasTrouver db "Thread not found",0
Trouver db "Patched successfully",13,10,"Enter anything in the serial field for activate",0
szFileName1 db "XP Anti-Virus - Unregistred Version",0
szFileName2 db "XP Anti-Virus 2011 - Unregistred Version",0
szFileName3 db "XP Anti-Spyware - Unregistred Version",0
szFileName4 db "XP Anti-Spyware 2011 - Unregistred Version",0
szFileName5 db "XP Home Security - Unregistred Version",0
szFileName6 db "XP Home Security 2011 - Unregistred Version",0
szFileName7 db "XP Total Security - Unregistred Version",0
szFileName8 db "XP Total Security 2011 - Unregistred Version",0
szFileName9 db "XP Security - Unregistred Version",0
szFileName10 db "XP Security 2011 - Unregistred Version",0
szFileName11 db "XP Internet Security - Unregistred Version",0
szFileName12 db "XP Internet Security 2011 - Unregistred Version",0
szFileName13 db "Win 7 Anti-Virus - Unregistred Version",0
szFileName14 db "Win 7 Anti-Virus 2011 - Unregistred Version",0
szFileName15 db "Win 7 Anti-Spyware - Unregistred Version",0
szFileName16 db "Win 7 Anti-Spyware 2011 - Unregistred Version",0
szFileName17 db "Win 7 Home Security - Unregistred Version",0
szFileName18 db "Win 7 Home Security 2011 - Unregistred Version",0
szFileName19 db "Win 7 Total Security - Unregistred Version",0
szFileName20 db "Win 7 Total Security 2011 - Unregistred Version",0
szFileName21 db "Win 7 Security - Unregistred Version",0
szFileName22 db "Win 7 Security 2011 - Unregistred Version",0
szFileName23 db "Win 7 Internet Security - Unregistred Version",0
szFileName24 db "Win 7 Internet Security 2011 - Unregistred Version",0
szFileName25 db "Vista Anti-Virus - Unregistred Version",0
szFileName26 db "Vista Anti-Virus 2011 - Unregistred Version",0
szFileName27 db "Vista Anti-Spyware - Unregistred Version",0
szFileName28 db "Vista Anti-Spyware 2011 - Unregistred Version",0
szFileName29 db "Vista Home Security - Unregistred Version",0
szFileName30 db "Vista Home Security 2011 - Unregistred Version",0
szFileName31 db "Vista Total Security - Unregistred Version",0
szFileName32 db "Vista Total Security 2011 - Unregistred Version",0
szFileName33 db "Vista Security - Unregistred Version",0
szFileName34 db "Vista Security 2011 - Unregistred Version",0
szFileName35 db "Vista Internet Security - Unregistred Version",0
szFileName36 db "Vista Internet Security 2011 - Unregistred Version",0
AddressToPatch1 dd 0675356h ;0x0675356 (0x10, 16 digits check)
ReplaceBy1 db 090h,090h ;75 47 JNE SHORT 00675391 -> To NOP's
ReplaceSize1 dd 2 ;2 bytes changed
AddressToPatch2 dd 0675389h ;0x0675389 (badboy jump)k
ReplaceBy2 db 090h,090h,090h,090h,090h,090h ;0F85 F0010000 JNE 0067557F
ReplaceSize2 dd 6 ;6 bytes changed
.data?
PID dd ?
.code
start:
rogue proc hWin:DWORD,uMsg:DWORD,wParam:DWORD,lParam:DWORD
invoke FindWindow, NULL, offset szFileName1
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName2
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName3
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName4
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName5
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName6
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName7
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName8
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName9
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName10
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName11
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName12
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName13
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName14
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName15
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName16
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName17
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName18
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName19
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName20
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName21
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName22
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName23
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName24
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName25
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName26
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName27
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName28
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName29
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName30
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName31
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName32
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName33
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName34
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName35
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName36
cmp eax,0
jnz @patch
invoke Beep,100,30 ;lol :þ
invoke MessageBox, NULL, addr PasTrouver, addr Titre, MB_ICONEXCLAMATION
invoke ExitProcess,0
@patch: call patch
invoke ExitProcess,0
rogue EndP
patch proc
mov ebx, eax
Invoke GetWindowThreadProcessId, ebx, offset PID
Invoke OpenProcess, PROCESS_ALL_ACCESS,NULL, PID
mov ebx, eax
Invoke VirtualProtectEx, ebx, AddressToPatch1, 2, PAGE_EXECUTE_READWRITE, 00
Invoke WriteProcessMemory, ebx, AddressToPatch1, offset ReplaceBy1, ReplaceSize1, NULL
Invoke VirtualProtectEx, ebx, AddressToPatch2, 2, PAGE_EXECUTE_READWRITE, 00
Invoke WriteProcessMemory, ebx, AddressToPatch2, offset ReplaceBy2, ReplaceSize2, NULL
Invoke CloseHandle, ebx
invoke MessageBox, NULL, addr Trouver, addr Titre, MB_ICONINFORMATION
patch EndP
end start
.model flat,stdcall
option casemap:none
include windows.inc
uselib MACRO libname
include libname.inc
includelib libname.lib
ENDM
uselib user32
uselib kernel32
rogue PROTO :DWORD,:DWORD,:DWORD,:DWORD
.data
Titre db "Braviax multi-rogue generic patch", 0
PasTrouver db "Thread not found",0
Trouver db "Patched successfully",13,10,"Enter anything in the serial field for activate",0
szFileName1 db "XP Anti-Virus - Unregistred Version",0
szFileName2 db "XP Anti-Virus 2011 - Unregistred Version",0
szFileName3 db "XP Anti-Spyware - Unregistred Version",0
szFileName4 db "XP Anti-Spyware 2011 - Unregistred Version",0
szFileName5 db "XP Home Security - Unregistred Version",0
szFileName6 db "XP Home Security 2011 - Unregistred Version",0
szFileName7 db "XP Total Security - Unregistred Version",0
szFileName8 db "XP Total Security 2011 - Unregistred Version",0
szFileName9 db "XP Security - Unregistred Version",0
szFileName10 db "XP Security 2011 - Unregistred Version",0
szFileName11 db "XP Internet Security - Unregistred Version",0
szFileName12 db "XP Internet Security 2011 - Unregistred Version",0
szFileName13 db "Win 7 Anti-Virus - Unregistred Version",0
szFileName14 db "Win 7 Anti-Virus 2011 - Unregistred Version",0
szFileName15 db "Win 7 Anti-Spyware - Unregistred Version",0
szFileName16 db "Win 7 Anti-Spyware 2011 - Unregistred Version",0
szFileName17 db "Win 7 Home Security - Unregistred Version",0
szFileName18 db "Win 7 Home Security 2011 - Unregistred Version",0
szFileName19 db "Win 7 Total Security - Unregistred Version",0
szFileName20 db "Win 7 Total Security 2011 - Unregistred Version",0
szFileName21 db "Win 7 Security - Unregistred Version",0
szFileName22 db "Win 7 Security 2011 - Unregistred Version",0
szFileName23 db "Win 7 Internet Security - Unregistred Version",0
szFileName24 db "Win 7 Internet Security 2011 - Unregistred Version",0
szFileName25 db "Vista Anti-Virus - Unregistred Version",0
szFileName26 db "Vista Anti-Virus 2011 - Unregistred Version",0
szFileName27 db "Vista Anti-Spyware - Unregistred Version",0
szFileName28 db "Vista Anti-Spyware 2011 - Unregistred Version",0
szFileName29 db "Vista Home Security - Unregistred Version",0
szFileName30 db "Vista Home Security 2011 - Unregistred Version",0
szFileName31 db "Vista Total Security - Unregistred Version",0
szFileName32 db "Vista Total Security 2011 - Unregistred Version",0
szFileName33 db "Vista Security - Unregistred Version",0
szFileName34 db "Vista Security 2011 - Unregistred Version",0
szFileName35 db "Vista Internet Security - Unregistred Version",0
szFileName36 db "Vista Internet Security 2011 - Unregistred Version",0
AddressToPatch1 dd 0675356h ;0x0675356 (0x10, 16 digits check)
ReplaceBy1 db 090h,090h ;75 47 JNE SHORT 00675391 -> To NOP's
ReplaceSize1 dd 2 ;2 bytes changed
AddressToPatch2 dd 0675389h ;0x0675389 (badboy jump)k
ReplaceBy2 db 090h,090h,090h,090h,090h,090h ;0F85 F0010000 JNE 0067557F
ReplaceSize2 dd 6 ;6 bytes changed
.data?
PID dd ?
.code
start:
rogue proc hWin:DWORD,uMsg:DWORD,wParam:DWORD,lParam:DWORD
invoke FindWindow, NULL, offset szFileName1
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName2
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName3
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName4
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName5
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName6
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName7
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName8
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName9
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName10
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName11
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName12
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName13
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName14
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName15
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName16
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName17
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName18
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName19
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName20
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName21
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName22
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName23
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName24
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName25
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName26
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName27
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName28
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName29
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName30
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName31
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName32
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName33
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName34
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName35
cmp eax,0
jnz @patch
invoke FindWindow, NULL, offset szFileName36
cmp eax,0
jnz @patch
invoke Beep,100,30 ;lol :þ
invoke MessageBox, NULL, addr PasTrouver, addr Titre, MB_ICONEXCLAMATION
invoke ExitProcess,0
@patch: call patch
invoke ExitProcess,0
rogue EndP
patch proc
mov ebx, eax
Invoke GetWindowThreadProcessId, ebx, offset PID
Invoke OpenProcess, PROCESS_ALL_ACCESS,NULL, PID
mov ebx, eax
Invoke VirtualProtectEx, ebx, AddressToPatch1, 2, PAGE_EXECUTE_READWRITE, 00
Invoke WriteProcessMemory, ebx, AddressToPatch1, offset ReplaceBy1, ReplaceSize1, NULL
Invoke VirtualProtectEx, ebx, AddressToPatch2, 2, PAGE_EXECUTE_READWRITE, 00
Invoke WriteProcessMemory, ebx, AddressToPatch2, offset ReplaceBy2, ReplaceSize2, NULL
Invoke CloseHandle, ebx
invoke MessageBox, NULL, addr Trouver, addr Titre, MB_ICONINFORMATION
patch EndP
end start
Edit 4 June 2k11: New GUI !
Edit 7 June 2k11: New '2012' version, welcome to the future.
Serial (by S!Ri.URZ this time): 2233-298080-3424
No comments:
Post a Comment