A Free Malware Detector Toolkit comes from the CrySyS Lab at the Budapest University of Technology and Economics , which was the group to discover Dugu, as well as to discover a dropper file (installer) for Duqu that offered additional clues into how the malware would infect computers and spread its. Notably, the installer recovered by CrySyS was a malicious Word document (.doc) file, although security researchers said the malware may have been spread through other means as well.
This tool includes four command-line-executable components, which are easy to use , simple programs . To check that there is no backdoor or malicious code inside. That way, potential users can easily validate the source code before using it in highly specialized environments.
Zero day vulnerability detectors are also included in Duqu source code, which involves a font parsing flaw in the TrueType engine in 32-bit versions of Windows. That vulnerability would have helped the malware to spread and infect its target without being detected. But Microsoft has yet to issue a patch that fixes the flaw exploited by Duqu.
You can download it from here
0 comments:
Post a Comment