Hi all
I was testing out some newly reported malware and came upon this almost brand new but apparently rapidly spreading threat earlier today. I ran the .exe file on a test machine, which as usual is running NIS09, and was immediately infected. It seems to bypass SONAR almost effortlessly, yet drops rootkits into Windows system32.
I have posted some logs below. Note, Malwarebytes picks up the infected registry keys, but they return on reboot. Virus Total today reports that 8/36 of their listed vendors have just added definitions for the .exe file, Norton and Kaspersky have not yet picked up the threat, however I have uploaded the file to both for analysis and am awaiting a response.
These are the tracking numbers from Symantec Security Response:
Symantec Security Response Automation: Tracking #10006864
Symantec Security Response Automation: Tracking #10006869
Note that a full Norton scan comes up clean, with aggressive heuristics, and HijackThis logs are also clean. The symptoms of the infection are rogue advertisements coming up in IE, as a result of redirection after waiting for a typed URL to load.
Here are the logs from Malwarebytes and the result from Virus Total, I was hoping someone may be able to shed some light or help find some removal tips for this nasty infection.
Look forward to any suggestions.
Thanks
Virus Total: Link.
Malwarebytes Log:
31/10/2008 9:41:04 PM
mbam-log-2008-10-31 (21-40-59).txt
Scan type: Full Scan (H:\|)
Objects scanned: 64918
Time elapsed: 19 minute(s), 28 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 6
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{ce50f76f-2cf6-47a1-a110-86b21ec499af}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{ce50f76f-2cf6-47a1-a110-86b21ec499af}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{ce50f76f-2cf6-47a1-a110-86b21ec499af}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.210 85.255.112.67 -> No action taken.
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)