Final stretch, nothing to loose: going to WAR with my rootkit! Any input appreciated!

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by aSILENTfire, Apr 17, 2013.

  1. aSILENTfire

    aSILENTfire Private E-2

    Please, please help me!

    College finals are coming up, and I have a test online tonight, but am unable to fill in any form in any browser on my school site on my network.

    Anyway I'm sick and tired of it, so I'm going to pull a marathon war session here.. I don't want to go on too long with background information as what I'm trying to do is pretty straightforward, but let me sprint thru the briefing:

    (this ended up being kind of long, the bottom part is the URGENT part, so if you like, please just skip past the quoted text.)

    SITREP!
    I have just erased the hard drive on my laptop with DBAN, I am using HBCD 15.2 and/or the latest UBCD to access it now. A previous Hitman scan has mentioned something along the lines of "a hook? on the hard drive that can hide things from the scan", and I have never been able to successfully scan for a rootkit/bootkit.

    In Hirens, GMER 1.0.15.15281 reported approx 10 things while scanning X:\ and B:\ (both should be on RAM, but IDK), then I got a BSOD (bluescreen) reporting "IRQL_not_less_or_equal". I rebooted and rescanned X:\ with GMER, most of the things it found are gone, but there are 63 Disk entries with the name \Device\Harddisk0\DR0 with the value of "sector [01..63]: copy of MBR.
    I am running from miniXP so the 5 other entries such as "kernel module suspicions modification" are probably due to that.

    TDSSKiller also opened and appeared to run, although I could not check Loaded modules. It repots No threats found, but its Duration was 00:00:00 long. 2 objects processed, details+show information messages= objects: System memory; [Global]; \Device\Harddisk0\DR0 all OK.

    RootkitRevealer does not run, it extracts in a cmd window then closes. I have had this problem on every computer I have owned on every operating system I can imagine..

    !OBJECTIVE!

    The objective is to secure the hard drive, by any means necessary! If that means tossing it into Mordor then I would do it. my precious!!!

    It would be nice to have a normal detection of this thing with some antirootkit program, but I don't think I will have that pleasure.. I want to have every and all of those 1s and 0s FUBAR. I need to destroy the MBR, plus any and all other backup/hidden/evil sectors on that disk.

    Then and only then can the MBR and OS be built.. On a flat surface, not a bug or byte in sight.


    Thank you so much!

    Significant contributions to the success to this operation will not be overlooked.
     
    Last edited: Apr 17, 2013
  2. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    Progress: most disk wiping utilities that I have tried either don't see the disk or see it as around 470GB instead of 500GB. But a program called HDD Low Level Format Tool 4.25 by HDDGURU sees the disk:

    [0] Hitachi HTS545050A7E380 GG20A6C0 [500.1 GB]
    device capacity: 976,773,168 sectors

    Unfortunately it fails to format or Perform quick wipe (just remove partitions and MBR) at Locking device... with the message:

    Unable to lock device. Make sure you do not have open files on thie device and try again.

    I remember trying to use hdparm to perform a secure erase on the HDD last night, and it was frozen by the BIOS. Going into sleep mode is supposed to unfreeze it but my laptop won't wake from sleep mode now for some reason. I turned off the power management stuff in the BIOS but it still won't fully wake; the capslock/numlock keys are responsive and everything seems to work but the screen doesn't wake.

    Anyway, I'll be trying to unlock the hard drive, feel free to jump in if you have any thoughts. Thanks
     
  3. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    PLEASE! someone help, I have a lot of homework to do I just want to wipe the drive.. please
     
  4. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    *inserts laptop in microwave* :hammer
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    Continued posting bumps your thread to the bottom of the work queue as noted in the below sticky/pinned thread.

    Forum Rules and Guidelines - Do not post HijackThis logs

    I'm not clear on exactly what you are asking help for. If you are looking to totally erase your hard disk then you are posting in the wrong forum. This is the Malware Removal forum. For questions about software, you should post in the Software Forum. For questions about hardware, please post in the Hardware Forum.
     
  6. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    Well I just wanted to remove the Malware, plain and simple, I didn't care if anything worked afterwards I just wanted it gone. It turned out there was a suspicious modification if the MBR, and I used a tool to reset it and then filled the disk with 00s, (and reset MBR again) then I was able to run DBAN without problems. Its looking good so far!

    If anyone has a really bad persistent infection, it might be a bootloader. If your going to reformat anyway, I recommend looking in to cleaning out your boot sectors as well, as that is overlooked in a typical disk wipe.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    There are many types of MBR infections these days. Most can be removed by simple rewriting the MBR, however there have been qa number of new types that either block rewriting the MBR or that are actually partition infections. Some of these ( if not most ) can be remove by malware removal processes which will remove the partition infections. The brute force method can also be used. This brute force method is to simply delete all partitions on the hard disk. Then recreate new partitons, format and reinstall. Formatting is not sufficient with this kinds of infections.
     
  8. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    Thanks, I'm actually using Windows 8 secure boot now, any opinions on that?

    When I tried to fill the MBR with 00s it looked like it worked but there was i think 4 symbols at towards the end of the sector that kept coming back.. One program would always tell me my MBR was unrecognized/corrupt or modified, with XP's default MBR and Windows 7's default, as well as "wiped*".

    I'm trying NoVirusThanks EXE Radar Pro, I like it, but I'm seeing a few Windows OS files that are not signed by Microsoft.. like system32's rundll32.exe, and TiWorker... and a few more I don't remember..

    Shouldn't these windows OS files be signed by Microsoft? What gives?
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    Not currently. I'm sure it will be just a matter of time before malware figures out how to circumvent this. And if/when you do get malware, the secure boot feature will probably make it very difficult if not impossible to repair.

    Yes you would think so. Especially rundll32.exe. If that is not signed then it is not the valid MS file. Same for TiWorker.exe.

    You should check their Properties yourself.
     
  10. aSILENTfire

    aSILENTfire Private E-2

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    I was just watching procmon (process monitor, by sysinternals) and I had 1000's of "buffer overflows", "remote management", and something like "BOOTVID" and also my command prompt is not signed by Microsoft.

    I'll admit I've never leaned to use this program properly, but in the Event Stack summary there was one anomaly, and still is: WinLogon.exe has only one entry under "count" and has 9 decedents, all in the system32 or SYSTEM32 folders, and may have previously been in the System32 folder. The names include:

    U winlogon.exe
    U RtlUserThreadStart + 0x21
    U BaseThreadInitThunk + 0x1a
    U RtlFreeActivationContextStack + 0x21c
    U RtlExitUserThread + 0x4e
    U ZwTerminateThread + 0xa
    K KeSaveStateForHibrenate + 0x2a33
    K RtlDowncaseUnicodeString + 0x1d20
    K RtlDowncaseUnicodeString + 0x1c0e
    K NtCreateEvent + 0x2148
     
    Last edited: Apr 25, 2013
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Final stretch, nothing to loose: going to WAR with my rootkit! Any input apprecia

    If you have questions about or issues with how Windows 8 is working, I suggest that you post in the Software Forum to have a general discussion about it. We are really too busy here removing malware and fixing damage caused by malware to work non-malware topics. :) My Windows 8 files are signed. I suggest that you check your manully by right clicking on the files and selecting Properties and then look at the information on the Details tab to see if signed info shows up.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds