Is it possible to get your BIOS/Router/Modem/MBR Infected nowadays?

Discussion in 'Malware Help (A Specialist Will Reply)' started by azproc, Dec 27, 2010.

  1. azproc

    azproc Private E-2

    I've read the Readme first article, but since I don't believe that running anything on my system is real now, I need to ask the following questions.

    Question in thread title. I've previously been on another popular computing forum but seems to have changed since I last visited and I haven't gotten the best of replies so I'm turning to you MajorGeeks gurus

    I might be OCD but recently all the computers in the house have been performing rather strangely. So I did the usual... reset bios, unplug all unnecessary things, format/write zeroes to drive, install fresh genuine Windows.

    However, it just seems like I'm being redirected to false websites, re: Microsoft Windows Update doesn't work for me on a Windows 7 machine; just goes to a page not found. I haven't installed any software other than Windows Updates and Microsoft Security Essentials.

    So, with that in mind I'd like to ask the MajorGeeks community of amazing knowledge to shed some light upon how I know I'm not infected, re:

    BIOS - if I flash the BIOS, is a BIOS infection gone / how to tell if I have one?
    Router - Can someone hijack my router? I've hard-reset it with the reset button, turned off wireless (and took off the antennae to my DIR-655)
    Modem - hard reset as well; can someone control the ports?
    MBR - on XP machines - fixmbr and fixboot; on Win7 machines, tried everything with bootrec.exe.
    Formatting hard drives - does this remove all viruses? I don't think so.

    Thanks very much and hope this wasn't a waste of anyones time!
    Appreciate any input to solve my worries!

    Also, if anyone still has an ASUS P5WDH Deluxe, I'm wondering if anything shows up under Advanced -> USB Devices enabled; I have "1 USB hub" there that somehow I haven't noticed before - is my BIOS hacked? Running BIOS 3002 (newest version) by the way.

    EDIT: Also in Windows 7 I get random floppy and optical drive access when I'm not using them at all. Any reasons someone can pinpoint?

    Another question - Can I infect my BIOS by simply hooking up a supposedly infected hard drive via internal SATA or external USB otherwise? Not booting from it obviously.


    I appreciate your time and help, understanding that this isn't a tradtional malware question.
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    I know you have lots of questions that I have not yet addressed, but I think running the below will help you. :)

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )

    Once done with that, continue on with this:


    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide



    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:


    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
    Last edited by a moderator: Dec 28, 2010
  3. azproc

    azproc Private E-2

    Logs:

    TDSS Killer
    MGTools
    Combofix

    Superspyware and Malawarebytes to come.

    Operating System is Windows 7 Pro x64.
     

    Attached Files:

  4. azproc

    azproc Private E-2

    Superspyware and Malawarebytes don't seem to work. No log files generated.
     
  5. azproc

    azproc Private E-2

    Apologies, I attached the wrong file for the MG log.
    I also want to show this screenshot from combofix, not sure if it's useful.

    Under the MGlogs, I noticed under SysNative\Drivers in the last 120 days, there are things that go back to October. I did these on a clean system in the New Year.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    What do you mean by this?
    There's some information in this link regarding BIOS infections

    Yes entirely possible.

    Possible yes.

    Not if you have an MBR infection or boot sector infection.
    What websites exactly? What browser does it occur in? Try another browser, perhaps firefox, let me know if it happens with that too. Does it happen in safe mode?

    Seems you have the SAS logs here.

    Why wouldn't Malware Bytes install? Rename the downloaded mbam-setup.exe file to mb.exe to help work around certain malware and then run it as per the instructions. Attach the log for me.


    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    File::
    C:\Users\test\Local Settings\TEMP\18EC.tmp
    C:\Users\test\Local Settings\TEMP\9E90.tmp
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread

    Run this

    GMER - running with a random name

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Make sure you answer all my questions and also attach all the logs I requested.
     
  7. azproc

    azproc Private E-2

    Hi Kestrel13!

    I went and formatted my hard drive again and ran all the logs anew.
    I apologize for wasting your time earlier, but I've managed to run all the logs which I will attach here.




    I'm suspecting the MBRCheck, this line:
    \\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`06500000 (NTFS)
    Why is my drive offset?

    Just to note, the GMER scan showed no system alterations, resulting in a blank log file. Is this normal?

    What I mean is that I think my entire network is being controlled by someone else. Which means anything I install or do, is coming from the hacker's server and downloading onto my hard drive instead of installing the right things. My question is whether there is anything that exists that can control everything you download, such that it becomes a different file by the time you run it. I have a feeling that this is happening, which would prevent all antimalware software from running properly. Some anti-malware scans go relatively quickly as well.

    When I goto websites, such as those referenced to download materials, in Internet explorer, it often fails to find the download on the first attempt; I need to do two attempts in order to get the download box to come up; I think by this time the hacker has already figured me out and is transferring an altered file instead to me.

    Just to say that the data on my hard drive is NOT important, and if there is any other surefire way to get rid of what could be there, I'd be up for it.

    TDSS, SAS, Malawarebytes, Combofix
     

    Attached Files:

  8. azproc

    azproc Private E-2

    Continued from last message:

    MGTools after GMER
    MBR check
    2 things noted below.

    Occurs in Internet explorer. Will try an alternative browser and safe mode.
    Websites:
    All links in the Malware guide; first time I click the link it will error out and say it failed to connect, second time will work.

    3 things:

    1) Combofix always has a stops working message when I run it.
    2) In the Qoobox folder, BackEnv is not accessible. Is this normal?
    3) fflogs.txt in MGTools - I don't have Firefox, why does it return things?


    Thanks very much! I'm really thinking it is an MBR bug or something difficult to pinpoint.
     

    Attached Files:

    Last edited: Jan 9, 2011
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Not seeing any malware. I am just curious to see what is inside of certain directories.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    C:\Users\Stephen\AppData\Local\{417580EE-A16E-4E0C-A769-69ECFACFB26C}
    C:\Users\Stephen\AppData\Local\{63E8D0F7-AF72-4041-A41E-2D20E833D919}
    C:\Users\Stephen\AppData\Local\{E14CA30B-BC86-4CD1-89DB-05C12E4AD163}
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    You need to install some antivirus!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  10. azproc

    azproc Private E-2

    Hi Kestrel13!

    Here are the logs. Hope this is useful.

    Just out of curiosity I ran MBRCheck again.
    I couldn't right-click and select all as per instructions! Why is this? When I right click, nothing comes up. I had to printscreen a screenshot:

    Also attached is a picture of the MBRCheck.
    Questions for this:

    What does the \\.\PhysicalDrive0 at offset 0x00000000'06500000 (NTFS) mean? All of my computers have this.

    What is a Logical Drives mask 0x000001d? Does this mean a piece of malware is hiding my actual drive from being seen or accessessed properly?

    What is the "SHA1: 4379A3D43019B46FA357F7DD6A53B45A3CA8FB79"
    All my computers have this exactly the same; should they be different?

    Thanks
     

    Attached Files:

  11. azproc

    azproc Private E-2

    Apologies, I may have attached the wrong logs in the last post.

    Here they are! :)
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    There is nothing wrong with what MBRCheck is reporting! You are not infected.

    You can however delete these three empty directories:
    • C:\Users\Stephen\AppData\Local\{417580EE-A16E-4E0C-A769-69ECFACFB26C}
    • C:\Users\Stephen\AppData\Local\{63E8D0F7-AF72-4041-A41E-2D20E833D919}
    • C:\Users\Stephen\AppData\Local\{E14CA30B-BC86-4CD1-89DB-05C12E4AD163}
      [*]

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  13. azproc

    azproc Private E-2

    Hi Kestrel13!

    I think I have a BIOS rootkit. What is your experience with this?

    Here is where I read about it.
    ars technica com/civis/viewtopic.php?f=2&t=4103
    ars technica com/security/news/2009/03/researchers-demonstrate-bios-level-rootkit-attack.ars

    Otherwise,

    If it is a MBR or other hard drive resident bug, then how do I ensure that my hard drive is completely clean?

    I think it is booting drivers that I don't have. If you look at the past logs, it seems to me that Windows 7 is booting drivers that don't belong to my system - like Brother USB and AMDide. (In the msinfo tool: Software Environment>System Drivers)

    What I'm trying to say is, I believe there is something controlling absolutely everything I do; which would stop all the anti-malware and antivirus programs from detecting anything. I would like to know how to get rid of something like this.

    Thanks
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    As Kestrel stated, there is no evidence of malware in your logs. What makes you think there is something wrong?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds