EP_X0FF wrote:This is very likely original TDL3 infection. Behavior the same.Yep you were Correct!
A forum for reverse engineering, OS internals and malware analysis
EP_X0FF wrote:This is very likely original TDL3 infection. Behavior the same.Yep you were Correct!
EP_X0FF wrote:Thank you for providing these samples. Not all of them are really tdl3. There at least one 4dw3r3 tdl copy-paste clone. What about new tdl3 version I didn't yet downloaded it. Well if they changed something in infection module, then it is obviously not enough to counteract tdl3+ removers available at this time. To be honest I don't believe in tdl4 in near few months. Stealth model implemented in tdl3 is enough sophisticated and flexible as time proven.You are welcome :) If you'd be so kind to point out me in PM which samples are not tdl 3 - I will surely remove them from the pack.
[main]as task it downloads 3.742 updated tdlcmd.dll
quote=Dude, meet me in Montana XX00, Jesus (H. Christ)
version=3.273
subid=0
installdate=9.4.2010 13:25:40
builddate=9.4.2010 8:58:47
[injector]
*=tdlcmd.dll
[tdlcmd]
servers=https://zz87jhfda88.com/;https://91.212 ... n4cx00.cc/
wspservers=http://30xc1cjh91.com/;http://j00k877x. ... 3kjf7.com/
popupservers=http://clkh71yhks66.com/
version=3.741
delay=7200
clkservers=http://mfdclk001.org/
[tasks]
tdlcmd.dll=hxxps://112.121.181.26/rDbtafVZlDjA
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-08 23:46:20
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOKUME~1\Ghost\LOKALE~1\Temp\fwtiqpoc.sys
---- Kernel code sections - GMER 1.0.15 ----
.rsrc C:\WINDOWS\System32\DRIVERS\ipsec.sys entry point in ".rsrc" section [0xF6041614]
---- User code sections - GMER 1.0.15 ----
.text C:\WINDOWS\system32\wuauclt.exe[460] ntdll.dll!NtProtectVirtualMemory 7C91D6D0 5 Bytes JMP 0102000A
.text C:\WINDOWS\system32\wuauclt.exe[460] ntdll.dll!NtWriteVirtualMemory 7C91DF90 5 Bytes JMP 0103000A
.text C:\WINDOWS\system32\wuauclt.exe[460] ntdll.dll!KiUserExceptionDispatcher 7C91E45C 5 Bytes JMP 0101000C
.text C:\WINDOWS\System32\svchost.exe[1092] ntdll.dll!NtProtectVirtualMemory 7C91D6D0 5 Bytes JMP 007A000A
.text C:\WINDOWS\System32\svchost.exe[1092] ntdll.dll!NtWriteVirtualMemory 7C91DF90 5 Bytes JMP 007B000A
.text C:\WINDOWS\System32\svchost.exe[1092] ntdll.dll!KiUserExceptionDispatcher 7C91E45C 5 Bytes JMP 0079000C
.text C:\WINDOWS\System32\svchost.exe[1092] ole32.dll!CoCreateInstance 774D057E 5 Bytes JMP 01EE000A
.text C:\WINDOWS\Explorer.EXE[1640] ntdll.dll!NtProtectVirtualMemory 7C91D6D0 5 Bytes JMP 00A1000A
.text C:\WINDOWS\Explorer.EXE[1640] ntdll.dll!NtWriteVirtualMemory 7C91DF90 5 Bytes JMP 00A7000A
.text C:\WINDOWS\Explorer.EXE[1640] ntdll.dll!KiUserExceptionDispatcher 7C91E45C 5 Bytes JMP 00A0000C
---- Devices - GMER 1.0.15 ----
AttachedDevice \Driver\Tcpip \Device\Tcp pxrts.sys (Prevx Realtime Security/Prevx)
Device -> \Driver\atapi \Device\Harddisk0\DR0 8614AAC8
---- Files - GMER 1.0.15 ----
File C:\WINDOWS\System32\DRIVERS\ipsec.sys suspicious modification
File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification
---- EOF - GMER 1.0.15 ----
EP_X0FF wrote:Yes, I see that in my vm. It infects random driver.Yes khakis removed fine.
In its config it is still 3.273, no changes.
atapi.sys is still affected by rootkit btw.
Meriadoc, can you test this sample also? In my test old khakis successfully removes.
RkU Version: 5.1.707.2260, Type VX2 (VX+)several addresses in log replaced for security reasons (to avoid detection compromising).
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
0x81F11B36 Page with executable code, size: 4096 bytes
0x81F0DCF9 Page with executable code [ ETHREAD 0x81FC4B20 ] TID: 48, size: 775 bytes
0x81F0E636 Page with executable code [ ETHREAD 0x81FC4B20 ] TID: 48, size: 2506 bytes
0x81F0F3CF Page with executable code [ ETHREAD 0x81FC4B20 ] TID: 48, size: 3121 bytes
0x81F0E21A Page with executable code [ ETHREAD 0x81FC4B20 ] TID: 48, size: 3558 bytes
0x81F10C3F Page with executable code [ ETHREAD 0x81FC4B20 ] TID: 48, size: 961 bytes
0x81F11517 Page with executable code [ ETHREAD 0x81FC4388 ] TID: 60, size: 2793 bytes
0x81F0DBEF Page with executable code [ ETHREAD 0x81FC4388 ] TID: 60, size: 1041 bytes
0xF84AXXXX WARNING: Virus alike driver modification [dmio.sys] :: 0xXXX, size: XXX bytes
0x81F0XXXX WARNING: Driver modified [atapi.sys]
TDSS rootkit removing tool, Kaspersky Lab, 2010after reboot infection is alive.
version 2.2.8.1 Mar 22 2010 10:43:04
Scanning Services ...
Scanning Kernel memory ...
Driver "atapi" infected by TDSS rootkit!
File "C:\WINDOWS\system32\drivers\atapi.sys" infected by TDSS rootkit ... will b
e cured on next reboot
Completed
Results:
Memory objects infected / cured / cured on reboot: 1 / 0 / 0
Registry objects infected / cured / cured on reboot: 0 / 0 / 0
File objects infected / cured / cured on reboot: 1 / 0 / 1
To finalize removal of infection and avoid loosing of data program will
reboot your PC now.
Close all programs and choose Y to restart or N to continue