A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #3097  by bytejammer
 Sat Oct 16, 2010 7:35 pm
Jaxryley wrote:Dropped by a newish rogue AV.

vbma9e7b.sys - 6/43 - Kaspersky - Rootkit.Win32.TDSS.vfc - MD5 : 97b443e6c1aba6df2afb37a76faf975d
http://www.virustotal.com/file-scan/rep ... 1287223259
vbma9e7b.rar
Interesting. This driver is changing the access rights on anti-malware EXE files. I tried MBAM and Prevx on this rogue and both the mbam.exe and prevx.exe process get killed and the files on disk get a new DACL causing the file to be no longer accessible. Resetting the DACL with SetACL.exe restores from the countermeasure.

I think it isn't TDSS.
 #3101  by Jaxryley
 Sun Oct 17, 2010 12:25 am
Thanks for checking it out bytejammer. :)

On my testing VM's I keep several Malwarebytes pre-renamed mbam.exes such as explorer.exe, firefox.exe, mbam.com, mbam.scr.....

A pre-renamed mbam.exe to explorer.exe will get a scan up and running with this rogue active.
 #3104  by EP_X0FF
 Sun Oct 17, 2010 3:33 am
I don't think this is TDL. There is another malware Antivirus Pro 2010 that maybe interesting, because uses some TDL3 approach.
 #3105  by bytejammer
 Sun Oct 17, 2010 6:34 am
Jaxryley wrote:Thanks for checking it out bytejammer. :)

On my testing VM's I keep several Malwarebytes pre-renamed mbam.exes such as explorer.exe, firefox.exe, mbam.com, mbam.scr.....

A pre-renamed mbam.exe to explorer.exe will get a scan up and running with this rogue active.
I renamed it to test.exe and then this will still get killed and blocked by DACL. I used GMER to disable the service and then start a mbam.exe. I haven't found the exact trigger of the blocking mechanism but it surely doesnt just block on filenames. I could not use your suggestion of just renaming the exe.
 #3109  by Jaxryley
 Sun Oct 17, 2010 9:03 am
bytejammer wrote:I could not use your suggestion of just renaming the exe.
No just renaming the original mbam.exe won't allow it to run.

In my Malwarebyte's Programs Folder I have pre-renamed - already renamed mbam.exes sitting in there for testing purposes.

The last mbam icon with no extension showing is mbam.pif

The firefox.exe is killed as well but explorer.exe gets a scan up and running.

Image
 #3133  by 4r0
 Tue Oct 19, 2010 9:22 am
TDSS 3? 4? x64? (attached)
Attachments
Password: virus
Trojan-Dropper.Win32.TDSS.nwy

(114.47 KiB) Downloaded 77 times
Password: virus
Trojan-Spy.Win32.Carberp.o

(36.46 KiB) Downloaded 78 times
Last edited by 4r0 on Tue Oct 19, 2010 1:00 pm, edited 1 time in total.
 #3134  by EP_X0FF
 Tue Oct 19, 2010 9:47 am
Yes it is.
[main]
version=0.03
aid=30020
sid=0
builddate=4096
rnd=1123561945
[inject]
*=cmd.dll
* (x64)=cmd64.dll
[cmd]
srv=hxxps://kangojim1.com/;hxxps://lkaturi71.com/;hxxps://rukkeianno.in/;hxxps://neywrika.in/;hxxps://86b6b6b6.com/
wsrv=hxxp://rudolfdisney.com/;hxxp://crozybanner.com/;hxxp://imagemonstar.com/;hxxp://funimgpixson.com/;hxxp://bunnylandisney.com/
psrv=hxxp://cri71ki813ck.com/
version=0.15
Attachments
pass: malware
(67.12 KiB) Downloaded 84 times
  • 1
  • 25
  • 26
  • 27
  • 28
  • 29
  • 60