In this report Curesec went further with the trojan analysis – how it operates, how it injects itself into strategic system points and what kind of anti-reversing and anti-debugging techniques it uses. In the next report Curesec will write more about the rootkit functionality.
Read more here – https://cureblog.de/2013/09/inkasso-trojaner-part-3/