Michael;
Interesting:
$ python vol.py --plugins=contrib/plugins/malware
zeusscan2 -f ~/Images/CA005040-HP8460/CA005040-HP8460-RAM.dd4.001
--profile=Win7SP1x86 -p 2928
Volatility Foundation Volatility Framework 2.3.1
[a05p8zz@W0147206 volatility-2.3.1]$
Ends relatively quickly with no
output.
Looking at 'strings' for the malfind
output relate to this process, I see all of the things I have come to know
and love about Zeus:
00008A40 tellerplus
00008A58 bancline
00008A6C fidelity
00008A80 micrsolv
00008A94 bankman
00008AA4 vantiv
00008AB4 episys
00008AC4 jack henry
00008ADC cruisenet
00008AF0 gplusmain
00008B04 launchpadshell.exe
00008B2C dirclt32.exe
00008B48 wtng.exe
00008B5C prologue.exe
00008B78 silverlake
00008B90 pcsws.exe
00008BA4 v48d0250s1
00008BBC fdmaster.exe
00008BD8 fastdoc
And our FireEye infrastructure
is screaming Zeus as well.
Thoughts?
-=[ Steve
]=-
>> Hi Steve,
>> The plugin may have encountered a bad size field,
causing it to read too much data into memory at once. Can you do the following
for me, please:
>> * Run zeusscan2 -p PID where PID is the process
id for explorer.exe (we know Zeus injects explorer, so this will let us
focus on just one process first)
>> * If you get the same memory-consumption behavior,
run vadinfo -p PID and send me the output (offlist is fine)
>> * If you don't see the same behavior on explorer.exe,
please run vadinfo across all processes (just vol.py vadinfo > results.txt)
and send me that instead.
>> Thanks!
>> Michael