A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #9634  by HackJack
 Thu Nov 10, 2011 6:44 am
it true it creates a new partion for sure, please refer the screenshot below
Attachments
rootkit-sst.jpg
Disk Management.jpg
rootkit-sst.jpg (137.67 KiB) Viewed 477 times
 #9635  by EP_X0FF
 Thu Nov 10, 2011 6:51 am
And? I know that this is Alureon.FE aka MaxSS, aka SST. I don't understand what are trying to do? If you want to remove it from infected machine - then how did it turned that you have multiple droppers and multiple screenshot before and after infection? Fixmbr completely kills any bootkit for standart MBR as in your case, your attached MBR indeed shows additional partition set as active as it happening in case of Alureon.FE infection, so rootkit is working. If you just playing with malware - then don't waste our time and start reading what others posted - all solutions already given.
 #9636  by PX5
 Thu Nov 10, 2011 8:05 am
They are saying that RC and fixmbr does not resolve this issue for them, no fixtools work either.

This makes 3 times i hear this story about bootkit, lol, partition, fixboot would sort that?
 #9637  by EP_X0FF
 Thu Nov 10, 2011 8:15 am
The only reasonable explanation here (if topic starter not trolling and doing all things right: tried available rootkit removers, RC commands, 3rd party partition managers, fixed boot record, removed new partition, set active for boot partition) is reinfection.
 #9647  by Ormu
 Thu Nov 10, 2011 9:16 pm
Just saw one of these, Kaspersky's TDSSkiller was able to remove it. TDSS filesystem was also present.

Edit: Hm, it was actually a different variant, detected as Rootkit.Boot.SST.a
 #9659  by HackJack
 Fri Nov 11, 2011 7:52 pm
We are dealing with Rootkit.Boot.SST.b

Gmer Loads with an error message as below

“ LoadDriver(“c:\docume~1\re\locals~1\temp\kwkcrpog.sys”) error 0xC000010E: cannot create a stable subkey under a volatile parent key”
In Gmer except Services, Registry and Files other options are disabled
Attachments
gmer  error message in sst.JPG
gmer error message
gmer error message in sst.JPG (11.67 KiB) Viewed 412 times
 #9660  by erikloman
 Fri Nov 11, 2011 8:10 pm
I think de Rootkit is filtering specific driver symbolic links. GMER's driver loads but de user mode application is not able to communicate so it tries to deploy driver again but its running already? aswMBR and HitmanPro have the same issue as GMER. Maybe someone has more info on how the rootkit blocks specific anti-rootkit drivers?