New definitions:
====================
Win32.Dialer.Conok
Win32.Monitor.EasyKeyLogger
Win32.TrojanDropper.Katok
New definitions:
====================
Win32.FraudTool.NoMalware
Win32.FraudTool.PcsProtector
Win32.TrojanDropper.Vbdropler
Win32.TrojanRansom.Lorobot
Win32.TrojanRansom.XBlocker
Win32.TrojanSpy.Burda
New definitions:
====================
Win32.Adware.Bridge
Win32.Adware.Coopen
Win32.Adware.DirectCard
Win32.Adware.DomPlayer
Win32.Adware.Imoney
Win32.Adware.OptMedia
Win32.FraudTool.SpyEraser
I found a couple of slides from a company internal training session and thought I would share them. It's just to give an example of the kind of work the Lavasoft research team at Malware Labs does.
It describes the binary analysis of a Win32.TrojanDropper.KGen sample, the malware multi-component structure and the payload it implements.