A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #15314  by Neurofunk
 Wed Aug 22, 2012 11:20 pm
Is sirefef moving back into the bootkit market? On this Win 7 x64 build I just found a machine hit with the services.exe infection but on top of that i found the following detections using Hitman Pro:

Image

It is killing TDSSKiller, aswMBR and other similar tools that are used to repair the infection which seems to be its usual trademark.. Also McAfee was trashed on this guys machine. User was admin.
 #15315  by Quads
 Thu Aug 23, 2012 12:58 am
I am seeing zeroaccess come with pihar,

I use FRST to break zeroaccess and remove the pihar custom code, plus other bits, then I use TDSSkiller to remove the TDLFS and files inside etc.

I then go though cleaning up the system as a whole.

Quads
 #15352  by malwarian
 Sat Aug 25, 2012 11:53 am
It is killing TDSSKiller, aswMBR and other similar tools that are used to repair the infection which seems to be its usual trademark.. Also McAfee was trashed on this guys machine. User was admin.
Yes,it creates a rootkit partition in disk management which is set to active.So it cannot removed like previous version(unknown partition).TDSSkiller,FIXTDSS,ASWMBR will not run on these machines.There is way to run TDSSkiller on XP and vista(32 bit) systems.Thanks to Root repeal :D On 64 bit systems ,rootkit partition has to be set inactive and boot partition has to changed to active.It is hard day at work because we are seeing both MAXSS and zero access on same systems . :(
 #15357  by Quads
 Sun Aug 26, 2012 4:53 am
NPE should not be used, causes Windows not to load a lot of the times.
leaves this to be fixed

EMS Settings
------------
identifier {0ce4991b-e6b3-4b16-b23c-5e0d9250e5d9}
custom:26000022 Yes

Sometimes Windows does boot only in Safe Mode, other times not at all.

After the correction Windows boots. ( a little slow first time).

Quads
 #15371  by Neurofunk
 Mon Aug 27, 2012 1:56 pm
Tigzy wrote:@Neurofunk : Do you have a dropper for this?
Sorry but I don't :( I checked around on the machine for anything that would resemble the dropper but came up empty handed. Judging by the access protection logs for our AV suite that we use it was using the install_flash_player.exe + malicious msimg32.dll method to do the install from %temp% on the users machine but no traces were left behind in there once it was done.
  • 1
  • 27
  • 28
  • 29
  • 30
  • 31
  • 56