newsbot
29-06-2010, 12:23 AM
Ace from our Kuala Lumpur lab has written a technical white paper on the internals of the highly advanced TDL3 trojan. The paper goes deep into the features of this advanced backdoor / rootkit.
http://www.f-secure.com/weblog/archives/tdl3.png
You can download "The Case of Trojan DownLoader TDL3" from here (http://www.f-secure.com/weblog/archives/The_Case_of__TDL3.pdf) [2MB pdf file].
In some ways, TDL3 is similar to the infamous Mebroot rootkit. For a thourough discussion on Mebroot, see our presentation (http://www.f-secure.com/weblog/archives/vb2008_kasslin_florio.pdf) from 2008.
On 28/06/10 At 10:05 AM
**Hidden Content: Check the thread to see hidden data.**
http://www.f-secure.com/weblog/archives/tdl3.png
You can download "The Case of Trojan DownLoader TDL3" from here (http://www.f-secure.com/weblog/archives/The_Case_of__TDL3.pdf) [2MB pdf file].
In some ways, TDL3 is similar to the infamous Mebroot rootkit. For a thourough discussion on Mebroot, see our presentation (http://www.f-secure.com/weblog/archives/vb2008_kasslin_florio.pdf) from 2008.
On 28/06/10 At 10:05 AM
**Hidden Content: Check the thread to see hidden data.**