Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MBR virus any hope?


  • Please log in to reply
37 replies to this topic

#1 alittlehelp

alittlehelp

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 17 August 2009 - 11:51 AM

Greetings experts,

My PC was recently infected with Virux.
With sound recommendations from members of this forum - took no chances an formatted.
Now have a brand new clean OS up and running.....

Or do I?
I run regular daily scans and maintenance with AVG, MBAM, SAS and they all turned up clean!
I ran Rootrepeal today (C:\ , E:\), and discovered MBR virus lurking silently on my external backup drive (E:\).
According to the Rootrepeal logs; the MBR seems to be isolated to the (E:\)external drive.
Unfortunately, E:\ is my only data backup.

I can post recent MBAM & Rootrepeal logs for eval, but wanted permission before doing so.

Help would be greatly appreciated.

Thanks.

BC AdBot (Login to Remove)

 


#2 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 17 August 2009 - 12:42 PM

Hello, you can post MBAM and RootRepeal logs here for review.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#3 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 17 August 2009 - 01:24 PM

H i elise025,
Thank you in advance :-)

MBAM log:
------------

Malwarebytes' Anti-Malware 1.40
Database version: 2639
Windows 5.1.2600 Service Pack 2

8/17/2009 11:19:44 AM
mbam-log-2009-08-17 (11-19-44).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 145074
Time elapsed: 26 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

=====================


Rootrepeal:
--------------
ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/17 08:28
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB79D5000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBAE3C000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB43B0000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: Volume E:\
Status: MBR Rootkit Detected!

Path: Volume E:\, Sector 61
Status: Sector mismatch

Path: E:\fFf‹.N$f
Status: Invisible to the Windows API!

Path: E:\}^t.ƒ
Status: Invisible to the Windows API!

Path: E:\
Status: Invisible to the Windows API!

Path: E:\f‹f‹F$f.f
Status: Invisible to the Windows API!

Path: E:\Ÿ‹
Status: Invisible to the Windows API!

Path: E:\Biz&Trade
Status: Visible to the Windows API, but not on disk.

==EOF==

There are 40+ folders in Path: E:\"" rootrepeal entrys' that repeat the same status "Visible to the Windows API, but not on disk"
None of which contain any funky symbols like the first few (Path: E:\) entries.

Please PM me if you require their view.

Thanks

Edited by alittlehelp, 17 August 2009 - 01:27 PM.


#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 17 August 2009 - 01:40 PM

Can you please explain me if those backups are from before your reformat? If so, I strongly recommend you to keep ONLY the files you know of and erase all other data, since you have a huge chance of re-infecting your C drive with infections that might wander still on your E drive.

Please download MBR.exe and save it to your desktop.

Doubleclick on the file to run it. It should produce a log file named mbr.txt on your desktop. Please post that here.

Edited by elise025, 17 August 2009 - 01:41 PM.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 17 August 2009 - 02:10 PM

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.6 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK
---------------------------------------

I didn't format the E drive.
The files on the E drive are all graphic and image files with the exeption of some excel and openoffice that were
stored, before the format. There were/are no programs or exe stored on this disk. I had read the Virux virus attached
it'self to exe, html and found exploits in adobe 0.7 .pdf files.
I deleted all html and pdf files before formatting (C:)and ran AVG, MBAM, SAS, Rootrepeal on the E disk before/afterward and
since then turned up clean....until now.

Please help. My whole career is on this disk....
No pressure though

Thanks

Edit: Btw did the Gmer utility scan the E drive?

Edited by alittlehelp, 17 August 2009 - 02:14 PM.


#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 17 August 2009 - 02:26 PM

I think your backup drive is not clean indeed. Is E a bootable drive (do you have an OS on it?)

I would recommend you to move all known save files temporarily to another drive, completely reformat your E drive and put them back.

With Virux it is best to not push your luck. It is likely still somewhere on your E drive.

Apart from the routine mentioned above, what sets VIRUX apart from VIRUT is that it also infects script files. For .PHP, .ASP and .HTML files, VIRUX inserts a malicious IFrame code which is automatically loaded when the script files are opened.

Source


To confirm if your E drive is infected, lets run a dr. Web scan on it. For good order we take C as well (better save than sorry).

DR. WEB CUREIT
----------------------
Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in Safe Mode.

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks (make sure you select your E drive!!) and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#7 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 17 August 2009 - 04:09 PM

Hi elsie,

I'm experiencing a little trouble with Dr. Web Curit.
This is not the first time it has crashed since my previous bout with Virux (before formatting).
I'm currently on my third attempt with Curit. I disabled my screen saver this time so I hope it helps....

Unless you have any alternative suggestions to Curit....I'll post the results momentarily.

Thanks for your patience.

#8 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 17 August 2009 - 04:18 PM

Well I spoke too soon

Dr Web Curit and my PC don't seem to be getting along.
It freezes with a warning message "sc94.exe has encountered a problem and needs to close"
This occurs at exactly the same point in the scan every time (C:\...c8IAIEEAAA_4_27_0_1002.MSI/stream004)

BTW: The external E: drive is just used for backing up my data files. I've been using it "right out of the box" I don't believe there is an OS installed on it.

Edited by alittlehelp, 17 August 2009 - 04:25 PM.


#9 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 18 August 2009 - 03:11 AM

Since you mentioned you have important data on your computer, I think it is best to go for a thorough investigation of your possible malware problems. Since I cannot do that in this forum (specific tools are not allowed here), I would like you to start a new thread and post a DDS log HERE and include a link to this thread. Please make sure that you read the information about getting started before you start your thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. Help is on the way!

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#10 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 18 August 2009 - 05:49 AM

Thanks elsie,

Last night, in an unfortunate attempt to salvage/backup my files from the E: drive to Cd, I only succeeded in re-infecting
my C: drive. It appears the virus has made an association with a Corel file extention (.CPT). Any attempt to move files of this type crashes the computer. I thought I got rid of them all, but apparently there were a few stragglers.
I plan an entire format of C: and E: and any thumbs just to be safe....

However, I really need to salvage the documents on the E:
Is there anyway to accomplish this without burning the virus to a CD along with the data?

Thanks

Edited by alittlehelp, 18 August 2009 - 05:52 AM.


#11 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 18 August 2009 - 10:24 AM

Please read the below and see if this answers your questions.

Until reformatting, you should keep your computer isolated (no active internet connection) to avoid spreading it any further!


Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. URL=http://blog.trendmicro.com/virux-cases-escalate/]Virux[/URL] is an even more complex file infector which can embed an iframe into the body of web-related files and infect script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutThis kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smrgsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#12 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 19 August 2009 - 07:28 AM

Thanks for all your support and informative links :thumbsup:

Yesterday, I decided to drop the bomb on both drives.
Lit the fuse and left the room.

Changing passwords today.

Performing Rootrepeal on another computer connected to the same router that all other AV/AM
says are clean....We'll see what turns up...

You may have not seen the last of me

I'll post a new request for help on that subject, so we can close out this one.

Thanks again, elise!
(I even spelled your name right this time) :flowers:

Edited by alittlehelp, 19 August 2009 - 07:31 AM.


#13 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 19 August 2009 - 08:25 AM

Okay, but if you have other problems, better post here, so we know what its all about. I will get a notification in case you reply, so you dont have to be afraid to be overlooked :thumbsup:

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#14 alittlehelp

alittlehelp
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 19 August 2009 - 10:00 AM

Hello again, and thank you for standing by.

I ran a Rootrepeal on the other computer that was connected to the router at the time of my
previous infection. I'm not sure what to make of this report...seems like somethings blocking?

Below is the Rootrepeal results for the (other) computer.
Can you help?

--------------------------------------------

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/19 10:32
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB0CC5000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF799F000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xAE6CA000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\Program Files\Common Files\Symantec Shared\VirusDefs\20090808.003\EraserUtilDrv10910.sys
Status: Locked to the Windows API!

SSDT
-------------------
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x8a9235a0

==EOF==

Thanks!

EDIT: I have some perplexing Rootrepeal results after scanning my PC external (E:) drive. This E drive had been completely formatted (4) four times, chkdsk once, and defragged once and It still shows there is an MBR rootkit !?!
The odd thing here, is, that There are absolutely no files on the drive!????
Should I start a new thread for these new findings or would you like to have a look?

Sorry to hammer you with all these requests...

Thanks elise

Edited by alittlehelp, 19 August 2009 - 10:32 AM.


#15 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:36 PM

Posted 19 August 2009 - 11:21 AM

You should make sure the following is done to avoid any reinfection.
1. Double check all backed-up files to make sure you know what they are so nothing bad can slip in from there.
2. Reformat ALL drives you have (including empty flash drives and so on). Only AFTER every drive is reformatted, you should re-install your OS on it. Before installing anything, make sure you get the latest windows updates to make sure no vulnerabilities are left. Install an Antivirus and a Firewall.
3. Now you can start putting your stuff back and re-installing other applications.

The above steps should keep you from re-infecting yourself. Also, do not connect your newly formatted computer to the same network as your other computer, before you confirm that that computer is clean as well.

If after all this, the E-drive still shows an BR rootkit, post the log here.

If you need any help, please let me know!

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users