-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hooks cleared #52
Comments
Hi! Thanks for the bug report. Can you provide any way to reproduce this problem so I can work on it? |
Also TBH I'm not entirely sure why would kernel32.dll ever be unloaded... perhaps you are debugging an NT native binary? |
Hi,
After Unload Event of kernel32 above, I worked-arround and make hooks again then it works. Thanks |
Perhaps that's an anti-debugging trick I don't know, it would make sense then since kernel32 should never be unloaded. I'm guessing the malware is trying to unload kernel32 but the system won't let it - however the debugger thinks it succeeded and removes all hooks. If you can send me the sample over email (mvilas at gmail dot com) that would help me a lot in figuring out what this malware is doing. :) |
The sample seems to have other anti-debug tricks in it so I'm pretty sure that must be what's going on here. https://infosec.cert-pa.it/analyze/search/0/0/0/0/0/0/tag:Vimditator.html |
Hello Mario, Updated: Sample sent to you |
Yes please, send me the sample. I only found a reference to it online, not the actual file. |
Yes, so sorry Mario. I just noticed that my previous email got blocked since I zipped it. Just sent another email to you. |
Just spam one more here in case you still missed my email. I uploaded sample here: |
In some cases, kernel32.dll is unloaded but actually the reference count of that module still greater than zero but apis hooked are cleared.
The text was updated successfully, but these errors were encountered: