Search the Community
Showing results for tags 'infection route'.
It may be the wrong place to ask this question, but... I do have an Windows 7 operating system that boots under loading the wrong driver signatures; it doesn't display anything but a black screen and the mouse cursor. I have scanned it by Immunet while it was attached via an USB adapter, but there only were three files detected as viruses (pretty much false positives). I'm not exactly sure where the malware resides, but I'm pretty sure it's not within your database. Since the typical malware reports only allow for small malicious files to be attached, my question is: do you accept physical shipping of entire hard drives? Is there a chance that in the future, there will be a bounties program for shipping malware unrecognized by the databases? I could provide some additional feedback regarding the issue I'm (not) having if you were interested in analysis, but ever since the malware infection symptoms were present even after installing an operating system on a fresh drive, I conclude that I have got some mobo specific trojan that is partially persistent even after updating the BIOS; and it seems that it was communicating with the OS layer and later the botnet, through an Intel's ME. I guess it also fits in the ideas section, but what I want to know is: how do I send an entire hard drive for malware analysis, and why isn't buyback of contaminated hardware already a trend (I'm talking to you, Intel)?