Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Win32/Mebroot.mbr trojan

  • This topic is locked This topic is locked
4 replies to this topic

#1 CemX


  • Members
  • 3 posts
  • Local time:05:33 PM

Posted 07 December 2009 - 05:29 PM

Hi there, I've read up on many threads here to try to solve this problem but I am having no luck. I installed windows new on a new hard disk which the partition was deleted and created again using windows cd, I have NOD32 and its reporting I "MBR sector of the 0. physical disk Win32/Mebroot.mbr trojan" I have run Malware Anti-bytes but it does not detect anything tried the NOD32 ESET Mebroot Remover it detects MBR rootkit (Win32/Mebroot) on my system but does not let me remove it, it says unable to clean. Used SuperAntiSpyware but it doesn't detect it either, used SpyBot Seek and Destroy but doesn't detect anything either.

I can't get RootRepeal to work, everytime i try to run it my system just restarts it self..

I have attached a report from GMER which doesn't find no rootkit either.

This is my report from DDS

DDS (Ver_09-12-01.01) - NTFSx86
Run by Cem at 20:05:46.60 on 07/12/2009
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_10
Microsoft Windows XP Professional 5.1.2600.2.874.44.1033.18.2047.1559 [GMT 7:00]

AV: ESET NOD32 Antivirus 4.0 *On-access scanning enabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\LClock\LClock.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\Program Files\Rainlendar2\Rainlendar2.exe
C:\Program Files\Internet Download Manager\IDMan.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Cem\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
BHO: IDMIEHlprObj Class: {0055c089-8582-441b-a0bf-17b458c2a3a8} - c:\program files\internet download manager\IDMIECC.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [Rainlendar2] c:\program files\rainlendar2\Rainlendar2.exe
uRun: [IDMan] c:\program files\internet download manager\IDMan.exe /onboot
mRun: [VistaDrive] c:\windows\vistadrive\VistaDrive.exe
mRun: [UnlockerAssistant] c:\program files\unlocker\UnlockerAssistant.exe -H
mRun: [LClock] c:\program files\lclock\LClock.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] c:\program files\google\gmail notifier\gnotify.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [egui] "c:\program files\eset\eset nod32 antivirus\egui.exe" /hide /waitservice
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
dRunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N
uPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
mPolicies-system: SynchronousMachineGroupPolicy = 0 (0x0)
mPolicies-system: SynchronousUserGroupPolicy = 0 (0x0)
dPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
IE: Download all links with IDM - c:\program files\internet download manager\IEGetAll.htm
IE: Download with IDM - c:\program files\internet download manager\IEExt.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_10-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_10-windows-i586.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\cem\applic~1\mozilla\firefox\profiles\47yarhpi.default\
FF - component: c:\documents and settings\cem\application data\idm\idmmzcc3\components\idmmzcc.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA}

c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 nvcchflt;NVIDIA Disk Cache Filter Driver;c:\windows\system32\drivers\nvcchflt.sys [2009-12-5 16640]
R0 si3112r;Silicon Image SiI 3512 SATARaid Controller;c:\windows\system32\drivers\SI3112r.sys [2007-11-20 110128]
R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [2009-9-29 108792]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [2009-9-29 96408]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-11-23 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-11-23 74480]
R2 ekrn;ESET Service;c:\program files\eset\eset nod32 antivirus\ekrn.exe [2009-9-29 735960]
S3 rootrepeal;rootrepeal;\??\c:\windows\system32\drivers\rootrepeal.sys --> c:\windows\system32\drivers\rootrepeal.sys [?]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-11-23 7408]
S4 PCAutoShutdown_Service;PCAutoShutdown_Service;c:\program files\pc auto shutdown\ShutdownService.exe [2009-12-5 462440]

=============== Created Last 30 ================

2009-12-07 12:45:47 0 d-----w- c:\program files\Enigma Software Group
2009-12-07 12:02:34 77312 ----a-w- C:\mbr.exe
2009-12-06 10:47:31 3248 ----a-w- c:\windows\system32\wbem\Outlook_01ca7661833d4e3e.mof
2009-12-06 07:02:03 0 d-----w- c:\program files\QuickPar
2009-12-06 06:14:51 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-12-06 06:14:51 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-12-06 06:01:33 0 d-----w- c:\windows\system32\xircom
2009-12-06 06:01:33 0 d-----w- c:\windows\system32\wbem\snmp
2009-12-06 06:01:32 0 d-----w- c:\program files\msn gaming zone
2009-12-06 05:55:02 0 d-sha-r- C:\cmdcons
2009-12-06 05:54:27 77312 ----a-w- c:\windows\MBR.exe
2009-12-06 05:54:25 260608 ----a-w- c:\windows\PEV.exe
2009-12-06 05:43:16 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-12-06 05:43:11 0 d-----w- c:\program files\SUPERAntiSpyware
2009-12-06 05:43:11 0 d-----w- c:\docume~1\cem\applic~1\SUPERAntiSpyware.com
2009-12-06 05:43:02 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-12-05 17:53:42 0 d-----w- c:\program files\ESET
2009-12-05 17:51:15 0 d-----w- c:\program files\Trend Micro
2009-12-05 13:14:17 0 d-----w- c:\program files\common files\ODBC
2009-12-05 13:14:12 0 d-----w- c:\program files\common files\SpeechEngines
2009-12-05 13:13:17 0 d-----r- c:\documents and settings\all users\Documents
2009-12-05 07:41:38 0 d-----w- c:\program files\iPod
2009-12-05 07:41:36 0 d-----w- c:\program files\iTunes
2009-12-05 07:41:36 0 d-----w- c:\docume~1\alluse~1\applic~1\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-12-05 07:41:28 0 d-----w- c:\program files\Bonjour
2009-12-05 07:29:14 0 d-----w- c:\program files\DAEMON Tools Lite
2009-12-05 07:29:02 0 d-----w- c:\docume~1\cem\applic~1\DAEMON Tools Lite
2009-12-05 07:29:00 0 d-----w- c:\docume~1\alluse~1\applic~1\DAEMON Tools Lite
2009-12-05 07:19:53 0 d-----w- c:\program files\VideoLAN
2009-12-05 07:13:37 0 d-----w- c:\program files\PC Auto Shutdown
2009-12-05 07:13:37 0 d-----w- c:\docume~1\alluse~1\applic~1\PC Auto Shutdown
2009-12-05 07:12:56 0 d-----w- c:\program files\PS3 Media Server
2009-12-05 07:12:47 0 d-----w- c:\program files\Microsoft
2009-12-05 07:12:34 0 d-----w- c:\program files\Windows Live SkyDrive
2009-12-05 07:11:08 5689344 ----a-w- c:\program files\mplayerc.exe
2009-12-05 07:08:57 0 d-----w- c:\program files\Foxit Software
2009-12-05 07:07:58 0 d-----w- c:\program files\FlashFXP
2009-12-05 07:07:58 0 d-----w- c:\docume~1\alluse~1\applic~1\FlashFXP
2009-12-05 07:07:47 0 d-----w- c:\docume~1\cem\applic~1\Malwarebytes
2009-12-05 07:07:41 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-12-05 07:07:40 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-05 07:07:24 0 d-----w- c:\program files\common files\Windows Live
2009-12-05 07:07:17 0 d-----w- c:\program files\Defraggler
2009-12-05 07:06:40 0 d-----w- c:\program files\CCleaner
2009-12-05 07:05:45 0 d-----w- c:\program files\K-Lite Codec Pack
2009-12-05 07:03:53 0 d-----w- c:\program files\Nero
2009-12-05 07:03:53 0 d-----w- c:\docume~1\alluse~1\applic~1\Nero
2009-12-05 07:02:19 0 d-----w- c:\program files\uTorrent
2009-12-05 07:02:03 0 d-----w- c:\docume~1\cem\applic~1\uTorrent
2009-12-05 06:59:27 0 d-----w- c:\docume~1\cem\applic~1\GrabIt
2009-12-05 06:58:01 0 d-----w- c:\program files\GrabIt
2009-12-05 06:55:46 0 d-----w- c:\program files\Microsoft ActiveSync
2009-12-05 06:54:00 0 d-----w- c:\docume~1\cem\applic~1\IDM
2009-12-05 06:54:00 0 d-----w- c:\docume~1\cem\applic~1\DMCache
2009-12-05 06:53:57 0 d-----w- c:\program files\Internet Download Manager
2009-12-05 06:34:57 0 d-----w- c:\program files\Rainlendar2
2009-12-05 06:32:02 0 d-----w- c:\program files\Gigabyte
2009-12-05 06:31:40 0 d-----w- c:\program files\Realtek Sound Manager
2009-12-05 06:31:38 0 d-----w- c:\program files\AvRack
2009-12-05 06:30:49 0 d-----w- c:\program files\Marvell
2009-12-05 06:21:41 0 d-sh--w- c:\documents and settings\all users\DRM
2009-12-05 06:21:21 0 d--h--w- c:\program files\WindowsUpdate
2009-12-05 06:21:19 0 d-----w- c:\program files\Online Services
2009-12-05 06:20:40 0 d-----w- c:\program files\common files\MSSoap
2009-12-05 06:19:23 0 d-----w- c:\program files\LClock
2009-12-05 06:19:18 0 d-----w- c:\program files\Windows Media Connect 2
2009-12-05 06:19:17 0 d-----w- c:\program files\HashTab Shell Extension
2009-12-05 06:19:16 0 d-----w- c:\program files\Unlocker
2009-12-05 06:19:16 0 d-----w- c:\program files\Microsoft PowerToys
2009-12-05 06:18:39 0 d-----w- c:\program files\Windows NT

==================== Find3M ====================

2009-12-05 07:39:36 410976 ----a-w- c:\windows\system32\deploytk.dll
2009-12-05 07:29:18 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2009-12-05 06:19:37 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2009-12-03 09:14:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-03 09:13:56 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-09-09 10:43:08 210352 ----a-w- c:\windows\system32\idmmbc.dll

============= FINISH: 20:05:57.87 ===============

Hopefully someone will help remove this dirty trojan.... I've never struggled with one this badly..

Attached Files

Posted Image

BC AdBot (Login to Remove)


#2 CemX

  • Topic Starter

  • Members
  • 3 posts
  • Local time:05:33 PM

Posted 15 December 2009 - 05:48 PM

I've found the fix for this just incase anyone has this problem. "MBR sector of the 0. physical disk Win32/Mebroot.mbr trojan" shows that the problem is in disk 0. I have 3 hard disk's in the computer and I got error messages "MBR sector of the 0. physical disk Win32/Mebroot.mbr trojan" and "MBR sector of the 2. physical disk Win32/Mebroot.mbr trojan" constantly after Windows re-boot. I followed

From Wilders security forumThe following should erase the contents of a USB flash RAM drive, including the master boot record and its associated partition table of data located in the first sector.

1. Open a Command Prompt (filename: CMD.EXE) in Windows. If you are running Microsoft Windows Vista or Windows 7, you will need to open an elevated command prompt.
2. Start DiskPart (filename: DISKPART.EXE), the command line disk partitioning tool. The DISKPART> will appear.
3. At the DISKPART> prompt, type "LIST DISK" (without quotes) and press enter. A list of currently-mounted disk drives will be displayed. Your USB flash RAM drive will show up with a number like 1, 2, 3, 4 and so forth.
4. At the DISKPART> prompt, type "SELECT DISK n" (without quotes), where n is the number of USB flash RAM drive and press enter. Assuming nothing has changed on the system, you would type "SELECT DISK 6"
5. At the DISKPART> prompt, type "CLEAN" (without quotes) and press enter. This tells DiskPart to zero-out (write 0's) across the entire disk. It may take a few moments for the operation to run, depending upon the capacity and speed of your USB flash RAM drive. When finished, you will have an empty USB flash drive.

At this point, you can type "EXIT" and press enter to quit, however, if you would like to format the disk or make it bootable (for a Windows Vista or Windows 7 installation), you can do so by following these steps:

1. At the DISKPART> prompt, type "CREATE PARTITION PRIMARY" (without quotes) and press enter. This creates a primary disk partition utilizing all of the flash RAM drive's capacity.
2. At the DISKPART> prompt, type "SELECT PARTITION 1" (without quotes) and press enter. This tells DiskPart you wish to perform operations on the partition (disk volume) you just created.
3. At the DISKPART> prompt, type "ACTIVE" (without quotes) and press enter. This tells DiskPart to make the disk partition startable, e.g., allows an operating system to be booted from the partition.
4. At the DISKPART> prompt, type either one of the following commands:
* "FORMAT FS=FAT32 QUICK" (without quotes) and press enter to format the USB flash drive using the FAT32 file system
* "FORMAT FS=NTFS QUICK" (without quotes) and press enter to format the USB flash drive using the NTFS file system.
It may take a moment or two to perform a quick format.
5. At the DISKPART> prompt, type "ASSIGN" (without quotes) and press enter. This tells DiskPart to assign the first available drive letter to the partition (disk volume) you just created on the USB flash RAM drive.
6. At the DISKPART> prompt, type "EXIT" (without quotes) and press enter to exit the DiskPart program.

You should have now an USB flash drive which is empty, but can be used as installation media for Windows Vista or Windows 7, should you decide to copy the contents of an installation DVD over to the drive and later use it for that purpose. Making a USB flash drive bootable for installation is done using the BootSect command on the Windows installation disc, but that's getting a little outisde the scope of this discussion, which was how to remove Win32/Mebroot from the USB Flash RAM drive.

Hope this helps anyone else :(

Posted Image

#3 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • Gender:Female
  • Local time:08:33 PM

Posted 20 December 2009 - 02:54 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro

If I haven't replied in 48 hours, please feel free to send me a PM.

Posted Image

#4 CemX

  • Topic Starter

  • Members
  • 3 posts
  • Local time:05:33 PM

Posted 20 December 2009 - 02:57 PM

I've solved it and posted the solution in my second post :(

Posted Image

#5 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:01:33 PM

Posted 20 December 2009 - 05:34 PM


Thanks for letting us know.

Below are some prevention tips.

Preventing Infections in the Future

Please also have a look at the following links, giving some advice and Tips to protect yourself against malware and reduce the potential for re-infection:
  • Avoid gaming sites, underground web pages, pirated software sites, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.

Since the problem appears to be resolved, this topic is now Closed.
If you need this topic reopened, please Send Me a Message. In your message please include the address of this thread in your request.

This applies only to the original topic starter

Everyone else please start a new topic.

With Regards,
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users