Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Kernel-based rootkit


  • This topic is locked This topic is locked
2 replies to this topic

#1 str8fe

str8fe

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:21 PM

Posted 02 February 2010 - 10:04 PM

Hey all,
I have no idea how to work around this thing and destroy it. I have tried so many different kinds of disk wiping utilities it isn't even funny. I gave up after the 12th try or so, wiping does not fix this problem. At this point I'm not interested in saving any data just want my drive secure again.
Appreciate any help you can offer.



DDS (Ver_09-12-01.01) - NTFSx86
Run by Family at 18:43:56.89 on Tue 02/02/2010
Internet Explorer: 6.0.2800.1106
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.1022.734 [GMT -8:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wpabaln.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\msiexec.exe
C:\Documents and Settings\Family\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
EB: Media Band: {32683183-48a0-441b-a342-7c2a440a9478} - %SystemRoot%\System32\browseui.dll
IE: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2010-02-03 02:33:04 0 d-----w- C:\HijackThis
2010-02-03 00:57:54 15600 ----a-w- c:\windows\system32\drivers\???????
2010-02-02 23:32:43 0 d-----w- c:\program files\TrendMicro
2010-02-02 21:18:29 0 d-----w- c:\windows\system32\SoftwareDistribution
2010-02-02 21:17:14 217816 ----a-w- c:\windows\system32\wuaucpl.cpl
2010-02-02 21:17:14 186136 ----a-w- c:\windows\system32\wuaueng1.dll
2010-02-02 21:17:14 167704 ----a-w- c:\windows\system32\wuauclt1.exe
2010-02-02 21:12:34 0 d-s---w- c:\documents and settings\family\UserData
2010-02-02 20:13:41 0 d-sh--w- c:\documents and settings\all users\DRM
2010-02-02 20:12:26 0 d-----w- c:\program files\common files\MSSoap
2010-02-02 20:11:19 0 d--h--w- c:\program files\WindowsUpdate
2010-02-02 20:11:19 0 d-----w- c:\program files\Online Services
2010-02-02 20:11:12 0 d-----w- c:\program files\Messenger
2010-02-02 20:11:08 0 d-----w- c:\program files\MSN Gaming Zone
2010-02-02 20:10:34 0 d-----w- c:\program files\Windows NT
2010-02-02 11:58:38 0 d-----w- c:\program files\common files\ODBC
2010-02-02 11:58:35 0 d-----w- c:\program files\common files\SpeechEngines
2010-02-02 11:58:12 0 d-----r- c:\documents and settings\all users\Documents

==================== Find3M ====================

2010-02-02 20:11:42 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2009-12-10 06:54:07 261632 ----a-w- c:\windows\PEV.exe

============= FINISH: 18:44:02.82 ===============

Attached Files


Edited by str8fe, 03 February 2010 - 01:47 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:21 AM

Posted 09 February 2010 - 07:46 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

Can you run Gmer, a rootkit scanner

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:21 AM

Posted 15 February 2010 - 07:03 PM

This topic has been closed.

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users