Hello Marcin. Please have a look at this articles. 1) http://www.avg.com/submit-sample 2) http://avgclick.me/NotDetected
Thank you for answer, but I'm afraid this does not concern my question. However, if I do upload a malware that is currently detectable could I get more technical info in reply? Like what does this software really do like taking screenshot, capturing keystrokes etc.? Or is it not available for end-users to gain that "knowledge" on malwares?
Thanks.
I don't really need an info "This is a trojan. Trojan does this and that". I'm more into technical details on those. I'm working to reverse a trojan that attacked me and passed by AVG.
As far as I got into this, my trojan was written in AutoIt3 to crypt, then real trojan was executed to other process code. The trojan was written in C#, and executed VB assembly from resource file.
Testing with AVG on crypted with autoit3 file resulted in nothing.
Testing decrypted .EXE file from autoit3 cryptor resulted in Atros.POK
Testing directly VB assembly extracted from ressource file resulted in PSW.MSIL.AIHT.
Trojan contained C# library for keyboard hook and AForge library for video/media processing (probably to get webcam image), also this trojan stole cookies, passwords and was screenshot'ing.
I'm asking about more detailed info about those two Atros.POK or globally Atros (Is it related to keylogger builders/ready softwares found on hackforums?) and PSW.MSIL.AIHT.
If it's wrong category, than could I ask where I should search for such info?
Thank you.
Thank you for answer, but I'm afraid this does not concern my question. However, if I do upload a malware that is currently detectable could I get more technical info in reply? Like what does this software really do like taking screenshot, capturing keystrokes etc.? Or is it not available for end-users to gain that "knowledge" on malwares?
Thanks.
Hello Marcin. Please have a look at this articles. 1) http://www.avg.com/submit-sample 2) http://avgclick.me/NotDetected