back to article Malware uses Windows product IDs to mix mutex

Malware writers are using Windows unique product numbers to generate mutex values to evade researchers, SANS security boffin Lenny Zeltser says. Mutex values are used as an accurate reference to determine if multiple identical processes are running. Malware including the infamous BackOff credit card stealer has used mutex for …

  1. Sampler

    VLK

    So how does this work if you have a raft of machines with the same id?

    (genuine question, it didn't seem to be covered - does it use the code as a starting point and therefore all will be unique, I didn't get that from the article)

    1. the spectacularly refined chap

      Re: VLK

      So how does this work if you have a raft of machines with the same id?

      I wouldn't have thought it would make any difference. The presumable intention is to ensure that only one copy is running at a time on any given system, to prevent the infection crippling the machine and indeed itself. If two different machines compute the same value it doesn't make any difference since the mutex is local to the system, so the one instance per machine relationship still holds.

    2. Lee D Silver badge

      Re: VLK

      Who cares?

      What it's saying is that to know if it's already running on a computer, it makes a mutex called by something (similar to, but probably a hash of) the GUID of that computer. It might end up with the same mutex on two machines, but who cares about that? All it needs is to know if it's running on THIS machine already without giving the game away with VIRUS_MUTEX_1 showing up in its code.

      And, sorry, but any decent install with a VLK should still be giving unique GUID/SID's - that's what sysprep.is for.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like