![]() |
#1
|
|||
|
|||
![]() Modules of current malware were first time detected by "VirusBlokAda" (http://anti-virus.by/en/) company specialists on the 17th of June, 2010 and were added to the anti-virus bases as Trojan-Spy.0485 and Malware-Cryptor.Win32.Inject.gen.2. During the analysis of malware there was revealed that it uses USB storage device for propagation.
You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file). So you just have to open infected USB storage device using Microsoft Explorer or any other file manager which can display icons (for i.e. Total Commander) to infect your Operating System and allow execution of the malware. Malware installs two drivers: mrxnet.sys and mrxcls.sys. They are used to inject code into systems processes and hide malware itself. That's the reason why you can't see malware files on the infected USB storage device. We have added those drivers to anti-virus bases as Rootkit.TmpHider and SScope.Rookit.TmpHider.2. Note that both drivers are signed with digital signature of Realtek Semiconductor Corp. (www.realtek.com). Thus, current malware should be added to very dangerous category causes the risk of the virus epidemic at the current moment. After we have added a new recordes to the anti-virus bases we are admitting a lot of detections of Rootkit.TmpHider and SScope.Rookit.TmpHider.2 all over the world. Source: http://anti-virus.by/en/tempo.shtml
__________________
Sergey Ulasen |
#2
|
||||
|
||||
![]() @sergey ulasen
Thanks for posting ![]() Fascinating, and potentially deadly to many out there, by the sound of it ![]() This would appear to circumvent USB autorun blockers. I expect that AntiExe etc programs like ProcessGuard etc, would block the .SYS etc from installing ? As not many people do not have such programs, i suppose unless their AV's etc have the Defs, they are vulnerable ![]() Please keep us updated on this ![]()
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#3
|
||||
|
||||
![]() Quote:
I am sure Tight SRP or AppLocker policy will defeat the execution of this malware. Remember, if it cannot execute, it cannot infect.
__________________
∆√♪ηάکђ ℓєтک υηcσммpℓιcαтє http://www.adminus.net http://technonxt.wordpress.com |
#4
|
||||
|
||||
![]() Originally Posted by AvinashR
Quote:
Quite possibly, Sully etc should know ![]() Quote:
Yes and no ![]()
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air Last edited by Cudni : July 12th, 2010 at 01:13 PM. Reason: Removed off topic comments |
#5
|
||||
|
||||
![]() Another disturbing feature is they are signed with digital signatures of the Realtek Semiconductor Corp
![]() These must be either fake, or manipulated real ones ? Things like this were said to be Impossible, by so called "experts more than once in the last few years ![]()
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#6
|
||||
|
||||
![]() Quote:
A shame there's so little information here. It doesn't sound like the average malware-du-jour. Isn't there any more information on the vulnerability in processing shortcut .LNK files? Quote:
I don't recall any expert saying "this" was impossible. It's always been possible to steal a legit certificate, if whoever owns that cert has lax enough security. It's possible to slap any cert on a file and at a glance it may look legit, but won't actually check out as valid if one bothers to check. There are possibilities like this - there's always even the option of fooling the certificate authority into issueing you a certificate that should belong to someone else (you're not Mozilla Corporation, but some CA might still give you a certificate with that name on it). In this particular case, there's not much information to go on to tell what's actually happened.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll |
#7
|
||||
|
||||
![]() Quote:
I was sure i did, so i went and searched. Here's several examples i found. Even though this article is on PGP i think it's aplicable. Quote:
Quote:
As i was searching for those conformation links, i also found an interesting article which explains the multiple weaknesses in 1st gen certs, and goes on to show how they can be improved ![]() Quote:
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#8
|
||||
|
||||
![]() Quote:
There seems to be some confusion here, due to the vagueness of some statements. None of those comments you quoted claims that it's impossible to have a (valid) digital signature on a malicious file. There's plenty of ways for that: for example, one could steal a cert from some innocent developer and then use it to sign malware. There's even more ways to get an invalid digital signature on a malware: for example, just copying it from some signed file. What those comments you quoted are saying is that it's not mathematically feasible to create a "fake" digital signature that also checks out as valid in someone else's name. When "so called experts" claim digital signatures can't be faked, they're referring to this mathematical difficulty of creating a fake signature that actually checks out as valid. They're not saying you can't steal a cert from someone, or fool a certificate authority into granting you someone else's cert, or such things. As far as the malware mentioned by the original poster is concerned, there is no information given that would tell us how the Realtek digital signature got on the malicious files. Was a legit Realtek cert stolen? Or is it just a case of copying the cert onto a malware binary, in which case the signature would check out as invalid? Or is it really a case where someone has successfully created a fake cert that checks out as valid, in spite of the mathematical difficulty of this? With the scarce information given here, it's impossible to tell, but the latter is very unlikely. Sure, there's the option of exploiting MD5 collisions, but even though that's theoretically possible, it's not exactly easy, and it's not like you have to use MD5 anyway. What I'm saying here is that the information given in this thread gives us no reason to suspect those "experts" were wrong about the mathematical infeasibility of creating fake digital signatures. There's a good reason for wanting more information on this case. When so little info is given, it's very difficult to say anything useful about the case. It would be nice to know more details on the .LNK file vulnerability, for example, and details on the digital signature on the malicious files, and many other factors. When one leaves such information out, it feels kind of like a movie teaser trailer - all the good stuff is missing. ![]()
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll |
#9
|
||||
|
||||
![]() Quote:
I've asked sergey ulasen to keep us updated, so hopefully he will include this aspect too ![]()
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#10
|
||||
|
||||
![]() Why create when it can be bought.....people in position(s) have been known to sell out.....
![]() |
#11
|
||||
|
||||
![]() I haven't received any kind of information from other vendors too, Hope Sergey Ulasen keep us updatedon this topic...
__________________
∆√♪ηάکђ ℓєтک υηcσммpℓιcαтє http://www.adminus.net http://technonxt.wordpress.com |
#12
|
|||
|
|||
![]() Quote:
Additional information about malware is in document: new_rootkit_en.pdf
__________________
Sergey Ulasen |
#13
|
||||
|
||||
![]() Quote:
Thanks for additional document...
__________________
∆√♪ηάکђ ℓєтک υηcσммpℓιcαтє http://www.adminus.net http://technonxt.wordpress.com |
#14
|
||||
|
||||
![]() Quote:
Thanks for that ![]() Quote:
Indeed. Most everyone has a price, and in larger companies it isn't even all that unusual to have a rogue-ish employee. Of course, the problem is in the risk of getting caught.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll |
#15
|
||||
|
||||
![]() Good work Ulasen Sergey and Kupreev Oleg
![]() Quotes from the PDF Quote:
Amazing, there's always something for the bad guys to keep them busy and find, and they sure do, and make use of them. Unbelievable you havn't heard back from Realtek ![]() Quote:
Vendors have known for several years that numerous fake etc certs have accompanied malware. So they havn't had any excuse for ignoring this vector ![]() Nice to see Gmer still on the ball ![]() Re - oem6c.pnf and oem7a.pnf Quote:
Could this be partially a new Graphics vulnerabilty exploit ? similar in "some" way/s to the MetaFiles exploits http://www.wilderssecurity.com/showthread.php?t=113044
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#16
|
||||
|
||||
![]() Quote:
No, I don't see how it could. According to Sergey's PDF, the malware infects the system by exploiting an unpatched vulnerability in processing LNK files. There is no mention of any other vulnerability being exploited. Those .pnf files are not graphic files - as stated in the PDF, they're encrypted. They probably contain things like the malware's configuration data.
__________________
Save your tears, for your tears will not save you :: Shameless LUA troll |
#17
|
|||
|
|||
![]() The questions I have are:
|
#18
|
||||
|
||||
![]() oem6c.pnf and oem7a.pnf listed in here - http://www.threatexpert.com/report.a...d06c03f92d0c13
Malware-Cryptor.Win32.Inject.gen.2 - Inject.gen.2 "might" be connected with the Bifrost Trojan ? - http://www.threatexpert.com/reports.....gen.2&x=7&y=8 MRXCLS - MRXNET - mrxcls.sys - http://www.sophos.com/security/analy...jstuxneta.html Those same 3 files in this ComboFix log Files Created on 2010-07-04 - http://pastebin.com/r5QvBHRt Also here - http://forum.drweb.com/index.php?showtopic=293997 * @Windchild Re - oem6c.pnf and oem7a.pnf OK, the .PNF extension must just be a coincidence then !
__________________
. Malware = You don't scare me ![]() A different perspective https://rt.com - https://rt.com/on-air |
#19
|
||||
|
||||
![]() Thanks Sergey for analysis.
Files put in root of vm, detection by arks
__________________
Who controls the past controls the future Who controls the present controls the past vmworld Last edited by Meriadoc : July 14th, 2010 at 08:01 AM. |
#20
|
|||
|
|||
![]() We wrote an e-mail to Microsoft, but they haven't answered us.
I think most of the antivirus vendors have paid attention to this virus and I hope that they report Microsoft and Realtek about problem too.
__________________
Sergey Ulasen |
#22
|
|||
|
|||
![]() hi guys,
has anyone already taken a deeper look at the malware? i found stuff like this after some decryption/unpacking stages of MD5 sample 016169ebebf1cec2aad6c7f0d0ee9026 Code:
this points me to the Siemens WinCC SCADA system. looks like this malware was made for espionage. |
#23
|
|||
|
|||
![]() Hello everybody,
*** Thank both Ulasen Sergey and Kupreev Oleg for this work ! *** ComboFix (by sUBs) and MBAM are already able to remove the infection. I'm looking forward to test it with KIS 2011. ==> Edit : KIS 2011 successfully prvent the infection http://www.lutile.be/images/erf/tmphider.JPG Best regards, Last edited by WawaSeb : July 15th, 2010 at 11:18 AM. |
#24
|
||||
|
||||
![]() Quote:
__________________
Who controls the past controls the future Who controls the present controls the past vmworld Last edited by Meriadoc : July 15th, 2010 at 09:10 AM. |
#25
|
||||
|
||||
![]() Quote:
__________________
Americans are the enemy? Mil. can arrest you? What the heck is going on? |
« Previous Thread | Next Thread » |
Thread Tools | Search this Thread |
|
|