Hi list,
I believe that one of my lab VM is owned by a sophisticated rootkit.
There are many signs of that:
Rootkit in my lab?
Rootkit in my lab? (part II)
Live analysis was a dead end. Needless to say that common live analysis tools and AV found
nothing.
So I have been focussed for days on analyzing the RAM with Volatility. And I found
absolutely nothing.
I am just afraid that now it is beyond my skills at this moment.
If some of you are curious, do not hesitate to have a look. Of course, I would love to
learn more and get some tips and feedbacks.
I can provide more volatility output if necessary, or even the dump.
Thank you!
--- phocean
Show replies by date