Results 1 to 5 of 5

Thread: Games changed, any new helpful ideas/tools?

  1. #1
    Member Slartarama's Avatar
    Join Date
    May 2008
    Location
    Pacific Northwest
    Posts
    53

    Games changed, any new helpful ideas/tools?

    So, just to state this, I am no infosec expert. I work as a sysadmin (windows obviously). I've been dealing with malware for a long time and a few years ago I noticed the game has definitely changed. They run in Safe mode, start up in new places, encrypt themselves, block known tools from running, redirect websites etc. I That and other resources helped me see why malware was changing, and being on the frontline, I getto see it everyday.(ugh)


    So today I'm dealing with a fake AV product. WIndows_*_ AntiVirus200Whatever. So this malware is really trixie, I can't get it to die, I'm having to rename tools to run them (I.E. HijackThis, ComboFix, ProcExplorere, etc). I am going to beat this one, but the question I have is, are there any other tools or places to look in the OS to fix this, other than Malware Bytes, SuperAnti-Spyware, Hijack This, ComboFix, and all major AV software, etc that will not be brought down by things like this new baddy?

    More importantly, since I like to learn where things live, how in the hell is it redirecting every browser that I install? I see no proxies set in any browser. Is there a hidden, proprietary proxy these things run, or am I missing something in the OS that can be changed to beat this thing blocking ALL access to anti-malware websites, which is pissing me off. That is a big one, since I want to know where is it redirecting the sites from? It is reminiscent of WindwosAntiVirus2008, but fresher and better written.

    I couldn't even run certain EXEs until I ran a registry fix for EXEs that... well, I've had to do that before, someone wrote and published that, I got that reg file last year, sorry author don't remember your name. I am pretty fluent in WMI/VBS scripting, and the registry so if someone can point in the direction of where this thing is blocking sites from, I'll write my own tool. I used Autoruns to check and could find nothing out of the ordinary, I also pulled a BHO from Hijakc this, but that hasn't stopped it. Nothing in AppInit, Run Runonce, Winlogin, Startup, etc. I checked the HOSTS file too, no joy.

    Tried SDFix, Fix Wlechia, FixVundo, FixVirtumonde, ConfikerFix, etc.

    I plan on slaving the drive to get rid of the thing tomorrow, so I am not worried about beating it, I just want any help pointing me towards real time tools that I might be missing, whether they are written tools or just some part of the OS/Registry that I can edit/hack to stop this crap in the future I don't care, either would be great, but I would prefer a whole understanding of how this is happening.

    Thanks,
    Slart
    Last edited by Slartarama; August 27th, 2009 at 07:00 AM.

  2. #2
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    What you are dealing with is this:

    http://en.wikipedia.org/wiki/MS_Antivirus_(malware)

    Each variant has its own way of downloading and installing itself onto a computer.
    AntiVirus2009 can also disable legitimate anti-malware programs and prevent the user from opening or re-enabling them. Antimalware applications disabled by AntiVirus2009 include McAfee, Spybot - Search & Destroy, AVG and Superantispyware. MS Antivirus is constantly updated and re-released to prevent detection by common legitimate anti-virus scanners.
    In November 2008, it was reported that a hacker known as NeoN hacked the Bakasoftware's database, and posted the earnings of the company received from XP Antivirus. The data revealed the most successful affiliate earned $158,000 in a week.
    So there is your motive. It is also how the malware scene has changed............it's all about money these days.

    Take a look at these:

    http://www.bleepingcomputer.com/viru...antivirus-2009

    http://www.2-spyware.com/remove-antivirus-2009.html

    http://www.spywareremove.com/removeAntivirus2009.html

    Try A-Squared:

    http://www.emsisoft.com/en/software/free/

    And protect your Registry:

    http://www.diamondcs.com.au/freeutilities/regprot.php

    These things are difficult to get rid of even in safe mode. Your best bet is to slave the drive or boot a live CD.

    Last edited by nihil; August 25th, 2009 at 09:19 AM.

  3. #3
    Member Slartarama's Avatar
    Join Date
    May 2008
    Location
    Pacific Northwest
    Posts
    53
    [QUOTE=nihil;950861]What you are dealing with is this:

    http://en.wikipedia.org/wiki/MS_Antivirus_(malware)

    MS Antivirus is constantly updated and re-released to prevent detection by common legitimate anti-virus scanners./QUOTE]

    [Quote]

    Yeah Must be a new strain today. I actually used the 158K a week quote in my paper. Gee I wonder why they write this kind of thing?

    Take a look at these:

    http://www.bleepingcomputer.com/viru...antivirus-2009

    http://www.2-spyware.com/remove-antivirus-2009.html

    http://www.spywareremove.com/removeAntivirus2009.html

    Try A-Squared:

    http://www.emsisoft.com/en/software/free/

    And protect your Registry:

    http://www.diamondcs.com.au/freeutilities/regprot.php

    These things are difficult to get rid of even in safe mode. Your best bet is to slave the drive or boot a live CD.


    Thanks, I'll check out the links. And yeah I was thinking the only way to kill this was to slave the drive or boot into a PEBuilder type disk.

    Does it feel like we're losing the war yet?

    I am thankful that there is only one or two fo these PCs that slip through, if an entire infrastructure was hit, well I'd hate to work there.

  4. #4
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Does it feel like we're losing the war yet?
    No, but I would say that the rules of engagement have changed substantially. Most malware these days is written to make money not mischief. It is effectively commercial malware that is frequently updated to obfuscate it. I guess that's why traditional pattern matching AVs don't fare too well against it?

    Gee I wonder why they write this kind of thing?
    Because they are getting paid for it. Malware authorship has now matured into a business or profession

    Sorry Slart, I didn't take this in:

    Often it is a pain because our environment has tons of separate applications and it is not feasible to remiage the PCs
    I know the environment. Have you looked at products like DeepFreeze?

    http://www.faronics.com/

    It makes an image of each desktop and reloads it every time the machine is rebooted. Sure, it can be circumvented, but scareware authors are percentage players so they probably wouldn't bother. Given these products are usually installed in corporate, public and institutional environments there would be no point, as the user doesn't have purchasing authority.

    Anyway, from a scareware viewpoint, infecting those sorts of environment is a waste of space, they just can't avoid them.

    If you have power users then you might also look at tools like Mamutu, Process Guard or Online Armor. They will monitor activity and program installation. A sort of flashy version of UAC, but they learn, so over time become less annoying.

    Another thought might be virtual sandboxes?



    EDIT:

    http://www.returnilvirtualsystem.com...ystem-personal

    http://www.shadowstor.com/products/ShadowUser/

    http://www.shadownow.com/index.html

    http://www.fortresgrand.com/products/cls/cls.htm
    [Also do a virtual sandbox]
    Last edited by nihil; August 25th, 2009 at 10:35 AM. Reason: more links

  5. #5
    Member Slartarama's Avatar
    Join Date
    May 2008
    Location
    Pacific Northwest
    Posts
    53
    Gee I wonder why they write this kind of thing?
    Yeah, sorry I meant that as sarcasm. I've been explaining to people the motivations of modern malware writers a lot lately. Everyone seems to get very defensive when we show up to clean malware and the first thing they say is "Why would a hacker want my files?", so I have to explain botnets to them, which usually scares the willies out them.

    I looked at Deepfreeze a year or two ago. It's a nice product, but I don't make any purchasing decisions. One good thing is that our environment is changing and going to be more locked down. But thanks, I forgot about Deepfreeze, maybe I should demo it.

    Thanks for the responses Nihil.

    -Slart

Similar Threads

  1. Doom
    By gore in forum AntiOnline's General Chit Chat
    Replies: 55
    Last Post: December 5th, 2005, 04:35 AM
  2. Video Game Violence Interview
    By The Grunt in forum AntiOnline's General Chit Chat
    Replies: 4
    Last Post: March 5th, 2005, 08:36 PM
  3. New PS2 games
    By LarryKingSux in forum AntiOnline's General Chit Chat
    Replies: 2
    Last Post: December 26th, 2003, 05:42 AM
  4. Banned Games
    By tyger_claw in forum AntiOnline's General Chit Chat
    Replies: 69
    Last Post: February 7th, 2003, 07:15 PM
  5. Cosmos Games...
    By Negative in forum Cosmos
    Replies: 15
    Last Post: March 14th, 2002, 01:19 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •