Bios Hijacked

Discussion in 'Malware Help (A Specialist Will Reply)' started by enemyboat, Jun 26, 2007.

  1. enemyboat

    enemyboat Private E-2

    I'm pretty knowledgeble about computers, and I can figure out things pretty fast, but I need help with this one.

    I've posted on the forum before, about 3 weeks ago, and I thought my issues were XP related. I have chased my problem down to the very root of my computer using the Ultimate Boot Cd for Dos.

    Recently I downloaded the stock firmware for my motherboard, and the Flashing Program has seemed to be different than the stock version. I also remember having a different bios than the one that is loading now. The current Bios running according to my bootup screen is

    Phoenix 6.00pg WorkstationBIOS

    I tried to reset the bios from software and hardware, but all it did was just give a cmos checksum error and loaded the malware back into place.

    Using a program to view the bios and bios extentions, I found the following list:

    Found:
    Freedos 7.10 running
    Advanced Power Management v1.2
    Plug and Play-Bios v3.0
    IBM/MS int13 Extentions v1.2
    System Management-Bios v2.2
    Award Modular Bios
    __________________________________________
    VESA BIOS extentions v2.0
    |
    -Found VBE Power MGT v1.0
    -VBE Accelerator Functions not active or available

    Then I used a program called !BIOS to see if I could fix the problem myself by changing the Decimal/Hex manually, and every time I saved the string, the 13th string would automatically revert back to it's old number.

    This virus/malware has already spread to 8 other known computers, 4 of which are behind a secure network, and at least one which had Vista on it.

    All help given would be greatfully accepted.

    Boat~
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't know of any methods that exist to detect or remove BIOS infections which are rare but not impossible. More than a year and a half ago people were already taking about possible future BIOS Rootkits. (You can read a little about this here:http://www.antirootkit.com/blog/category/bios-rootkits/ ) If you cannot erase and then totall reprogram your BIOS from scratch, you will have to check to see if your flash devices are socketed so that you can either totally replace them or reprogram them in a fixture design for programming flash chips.
    Somethings to possibly try in your attempt to reprogram your BIOS:
    • unplug the battery for your CMOS backup and leave your PC physically unplugged from all power for awhile to make sure CMOS backup is erase. Do not plug this battery back in until you complete reprogramming.
    • withing the BIOS disable any memory option like caching or shadowing.
    • the try to reprogram the BIOS
    You should check to make all of the computers in your network have the BIOS password protected and that they have any builtin virus protection enabled (some systems have this feature). This would make it much more difficult for anything to rewrite the BIOS since you would have to have the password and disable security features before writing to flash. The other alternative is would be to see if you have the ability to turn off by default the ability to flash the BIOS. PCs used to require a jumper switch setting to be made directly on the mother board to do this. This is a much more secure option. And since BIOS is rarely rewritten and should only be performed by very specific people, disabling this ability to rewrite the BIOS at anytime is not an issue.
     
  3. enemyboat

    enemyboat Private E-2

    The Black Hat Briefings in Las Vegas are a pointer as to the direction that particular IT trends are going. With six presentations this year dedicated to Rootkits it shows that Rootkits are fast becoming a bigger threat to users.

    I live in las vegas. The infection happened in April. I had no firewall or anti-virus/spyware protection. Coincidencial?

    *Using Ultimate Boot cd for Dos*

    I've tried running a rootkit program, and it's being denied access because I'm pretty much using a virtual computer with this thing hijacking my bios.

    *Using Ultimate Boot cd for Win*

    I used a program called ServicesPE to show me all the services/devices on the computer, post xp install. The interesting thing to me were the dmboot.sys, dmload.sys, and dmio.sys on the services side. It seemed like all the devices listed were broken versions of the hardware.

    I will update info soon.....
     
  4. enemyboat

    enemyboat Private E-2

    I have seen my motherboard bus' using a program called PCISniffer on Ultimate Boot CD for win (from nowon called UBCD).

    Bus 0 had 1 disabled item, probably because I took out all of my hardware except for my video card, floppy drive, and cdrom drive.

    Bus 1 seemed to have all the hardware devices but Irq 10 had the Nvidia port enumerator. There were also others labeled as NOT INSTALLED. There were a few Irq items that had I/O memory.

    Hopefully I can get back online later.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! Running without protection always leads to infections sooner or later.

    Those are valid files. See:

    http://www.file.net/process/dmboot.sys.html
     
  6. enemyboat

    enemyboat Private E-2

    Chaslang,

    I really am thankful for your help. I have been working on this alone for about 1.5 months now, and it's been frustrating.

    Yeah, I'm well aware of this. For the longest time, I had no information on my computer that I deemed personal. I was under the assumption that the old modem I was using had a firewall. Assumptions...

    Anyway, these files are valid files unless there is a mal-program on your system re-writing everything that the cdrom shoots out. It's also changing the group policy almost imediately after the completion of windows xp pro's installation.
     
  7. enemyboat

    enemyboat Private E-2

    I decided to change things up a bit. In my impulsivity, I thought I would try loading a linux boot disk from the UBCD for Dos. Last nite when I used the linux boot disk, I found that everything seemed peaceful; I don't know the program. I did see that I had 2 files locked and 5 sessions open during my experiment. And I've concluded thus far that Linux has access to whatever this malware is, and where it is stored.

    In the similiar threads section, I saw this link:

    Also, I made a few notes of what seemed enumerated files.
    Bitmap blocks ----> linux connection.

    I made a search of a certain txt line I thought was interesting, because it seemed to have cause an error. The line I searched for was:
    corruption found in superblock <%s=%lu>

    I found information on a "Problem.C" which was some type of linux program. Kinda sounds like a malware thing, but I don't know.

    As I have experiemented more with the program ServicesPE, I have found that you can run services/devices at startup. I got a crazy idea - If I got some help, maybe I could give the windows system32 directory a "service" program that can run at the time of booting the computer. This service might just be able to be setup as the only service running on boot up.

    I know you might not be fimiliar with ServicesPE Chaslang, but what do you think of that idea?

    As soon as I can get to an uninfected computer, I will attempt to create this linux boot CD with added motherboard firmware.

    Thats the updates for today. Thanks again for your help.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Actually since I have never experimented with this, I cannot say whether it will help you getyour BIOS reprogramed or not.

    I know what ServicesPE is but I don't see how it would be of any use to you. In addition are you capable of writing a service to use? And what are you planning to do with it? Many services on your system are required to run at startup for normal operation. You can disable quite a few and this will limit the ability to do many things, but if you disable ALL services Windows will not run.
     
  9. enemyboat

    enemyboat Private E-2

    When I was booting safe mode xp, (and I had all the cache, prefetch, ect that you suggested be turned off) the first thing that loaded was a nt kernal. There were normal files that had incorrect letter sensitivity, like the dmboot, dmload, and dmio.

    I have been using a dos program that manages partitions to try and see all of my hard drive, but it disallowes me to see an odd boot record with a wierd label.

    http://72.14.253.104/search?q=cache:lPaIiYikc0gJ:download.microsoft.com/download/9/c/5/9c5b2167-8017-4bae-9fde-d599bac8184a/wmi_security.doc+windows+nt+kernel+controlling+bios+false+acpi+firmware&hl=en&ct=clnk&cd=3&gl=us

    This seems to explain how a part of my hard drive is denying me access. Ever heard of anything like this explaination before?
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    None of this has anything to do with malware. You need to post in the Hardware Forum if you with to continue with this.
     
  11. enemyboat

    enemyboat Private E-2

    I just ran into the program "Unhijackme" while searching different things on google.

    It has found a trojan called Hackerdefence100. Do you know any info about it?

    It has an NT partition that controls the legacy device drivers I think. Either way, whenever I reinstall windows after writing zeros to the drive it reinstalls itself when the windows xp bootdisk starts up the xp install.

    Should I move the subject over to the hardware forum?
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't know anything about "Unhijackme" and I never heard of such an infection (if it really even detected anything - it could just be a false detection), but I doubt they have anything to do with fixing your System BIOS which was the topic of this thread.


    Are you sure that you are reinstalling from uninfected media?

    If your BIOS is infected, you need to find a way of reprogramming your BIOS and that is not something we can help you with in this forum. Thus the answer would be yes.
     
  13. enemyboat

    enemyboat Private E-2

    I'm positive this is a cmos issue. I've killed 1 motherboard now because I was careless in my bios-flashing-frustration.

    Thanks for your help. If I need more, I'll push on over to hardware.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome and good luck!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds