This is the relevant part of the log which shows the infection was found and cured.
2010/08/10 09:25:56.0968 Detected object count: 1
2010/08/10 09:26:10.0218 dmload (bd0e4e0c99fe9ad078dc074206549d52) C:\WINDOWS\system32\drivers\dmload.sys
2010/08/10 09:26:10.0218 Suspicious file (Forged): C:\WINDOWS\system32\drivers\dmload.sys. Real md5: bd0e4e0c99fe9ad078dc074206549d52, Fake md5: e9317282a63ca4d188c0df5e09c6ac5f
2010/08/10 09:26:15.0828 Backup copy found, using it..
2010/08/10 09:26:15.0859 C:\WINDOWS\system32\drivers\dmload.sys - will be cured after reboot
2010/08/10 09:26:15.0859 Rootkit.Win32.TDSS.tdl3(dmload) - User select action: Cure
is the third generation of TDSS
which uses rootkit
technology to hide itself on a system by infecting drivers like atapi.sys, iastor.sys and others. Atapi.sys is a common target for this rootkit because it loads early during the boot process and is difficult to detect. Common symptoms/signs of this infection include:
- Google search results redirected as TDL3 modifies DNS query results.
- Infected (patched) files like atapi.sys, iastor.sys and others in the Windows drivers folder.
- Slowness of the computer and poor performance.
- Multiple instances of IEXPLORE.exe in Task Manager.
- Internet Explorer opens on its own.
- BSODs that occur immediately after splash screen appears.
For more specific analysis and explanation of the infection, please refer to:Rootkits
, backdoor Trojans
, and IRCBots
are very dangerous
because they compromise system integrity
by making changes that allow it to be used by the attacker for malicious purposes. Rootkits are used by backdoor Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal
. Remote attackers use backdoors as a means of accessing and taking control of a computer that bepasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:
If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately
to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised
. They should be changed using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach.
Although the infection has been identified and removed, your machine has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed
. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed all components of a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee
that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat
and reinstall the OS. Please read:
Backdoors and What They Mean to You
Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system