A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #601  by gjf
 Fri Apr 09, 2010 5:16 pm
Do you have some public-accessable tools to remove this? No one is interested in private closed software. Otherwise it should be closed forum for testers of this software only.
 #603  by EP_X0FF
 Fri Apr 09, 2010 5:21 pm
Kernel Detective + GMER + RkU + clean system drivers backup and tdl3 will left the building. You need only know which driver is infected. Then it is only question of skills to replace it with original.
If you speak about full automatic or half-automatic remover, it not exists in public.
 #604  by ConanTheLibrarian
 Fri Apr 09, 2010 5:36 pm
After finding the random driver, simply disable it in Registry (Start value 4) and reboot. It takes the random drive offline and u can replace it on reboot. Then re-enable it (Start value 0). Works pretty well until they get an automated way.
 #605  by EP_X0FF
 Fri Apr 09, 2010 5:42 pm
AT4RE site seems to be changed, so link to TDLCleaner is invalid. Somebody tried TDL3+ Cleaner against new release?
 #606  by EP_X0FF
 Fri Apr 09, 2010 5:45 pm
Blitskrieg wrote:
EP_X0FF wrote:tested with TDSSKiller from KL.
after reboot infection is alive.
Yes, we are working on it.
Good to know, obviously it is not a big problem to adopt TDSSKiller for this new release.
 #607  by Blitskrieg
 Fri Apr 09, 2010 5:46 pm
windbreaker11 wrote:After finding the random driver, simply disable it in Registry (Start value 4) and reboot. It takes the random drive offline and u can replace it on reboot. Then re-enable it (Start value 0). Works pretty well until they get an automated way.
What about drivers that are critical for OS load?
 #608  by ConanTheLibrarian
 Fri Apr 09, 2010 5:51 pm
So far I've seen 5 now this morning and all worked fine with no BSOD. If that ever happens just use LKGC. Then replace offline in RC. I believe that u will not have any problems though. The drivers are not critical to boot. So far - intelide.sys, compbatt.sys, mouclass.sys, etc....
 #609  by wealllbe20
 Fri Apr 09, 2010 6:03 pm
Blitskrieg wrote: What about drivers that are critical for OS load?

goto HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\(drivername)

copy the same driver,but clean driver to c:\windows\system32\driver\(randomname.sys)

ImagePath=(put your copied good driver here(randomname.sys))

reboot

delete original atapi.sys or whatever the driver is .

copy (randomname.sys) to atapi.sys or whatever the driver name is.

change ImagePath in the registry, whalla
 #613  by gjf
 Fri Apr 09, 2010 8:02 pm
wealllbe20 wrote: goto HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\(drivername)
copy the same driver,but clean driver to c:\windows\system32\driver\(randomname.sys)
ImagePath=(put your copied good driver here(randomname.sys))
reboot
delete original atapi.sys or whatever the driver is .
copy (randomname.sys) to atapi.sys or whatever the driver name is.
change ImagePath in the registry, whalla
Good solution in two reboots if we have backup of these system drivers of course :)

And it will work if rootkit doesn't checks it's registry settings. So this solution will be completely destroyed in several strings of code by rootkit author :)

Blitskrieg, hope you will create what you told me. Sincerely - good luck!
  • 1
  • 5
  • 6
  • 7
  • 8
  • 9
  • 40