Sophisticated, advanced rootkit dropper/trojan
Source: InfoSec Institute [http://resources.infosecinstitute.com/step-by-step-tutorial-on-reverse-engineering-malware-the-zeroaccessmaxsmiscer-crimeware-rootkit/]
Usually, when a rootkit infects a host, the workflow is structured as follows:
ZeroAccess has some powerful rootkit capabilities, such as:
0 Comments
Leave a Reply. |
AuthorVitali Kremez Archives
September 2016
Categories |