Trojan horse Downloader.Generic.ML

G

Gargantu Butt

Nope, 98se + 3D Blaster Riva TNT


My c:\null was ~48K.

I'm running Win98SE as well with QuickView installed.

I find that opening with QuickView provides the tidiest formatting so
that it's easy to interpret the content.

WordPad, MSWord, and HexEdit will display the contents too but these
apps don't understand the formatting so you have to wade through heaps
of little squares and other binary gibberish.

Give QuickView a try. If you don't currently have it installed, you
can do so from Add/Remove Programs. Select the Windows Setup tab,
select "Accessories" and click on the "Details" button. Scroll down
the list of optional accessories and locate "QuickView". I suppose it
would be a very good idea to have your Win98 setup CD handy.

Anyway, whatever you decide to do about your "null" file, good luck.

Joachim
 
J

Jim Byrd

Hi Ron - I think it might be useful to run A2 (that was my original
recommendation, you may remember). Here's its current detection profile for
the free version:

Number of Signatures:
Trojans 80524
Dialer 27877
Worms 5064
Spyware 4166
Traces 26997

As you can see it's differently oriented than is a virus scanner. You can
download the free version here:

http://www.emsisoft.com/en/software/free/

It shouldn't take nearly as long as SysClean, although it will take a bit.
:) Run it from Safe mode w/Internet Access (in order to update) (or update
and then boot to Safe mode) or, even better, from a Clean Boot taking into
account the following. If it finds anything, clean, reboot and then run it
again. After everything is clean in Safe mode or Clean Boot, re-run it
after a normal boot still showing hidden files:

From my Blog:


Show hidden files and run all of the following removal tools from Safe mode
or a "Clean Boot" when possible, logged on as an Administrator. BEFORE
running these tools, be sure to clear all Temp files and your Temporary
Internet Files (TIF)(including offline content.) Reboot and test if the
malware is fixed after using each tool.

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339

Clean Boot - General Win2k/XP procedure, but see below for links for other
OS's (This for Win2k w/msconfig - you can obtain msconfig for Win2k here:
http://www.3feetunder.com/files/win2K_msconfig_setup.exe ):

1. StartRun enter msconfig.

2. On the General tab, click Selective Startup, and then clear the 'Process
System.ini File', 'Process Win.ini File', and 'Load Startup Items' check
boxes. Leave the 'boot.ini' boxes however they are currently set.

3. In the Services tab, check the "Hide All Microsoft Services" checkbox,
and then click the "Disable All" button. If you use a third party firewall
then re-check (enable) it. For example, if you use Zone Alarm, re-check the
True Vector Internet Monitor service (and you may also want to re-check
(enable) the zlclient on the Startup tab.) Equivalent services exist for
other third party firewalls. An alternative to this for XP users is to
enable at this time the XP native firewall (Internet Connection Firewall -
ICF). Be sure to turn it back off when you re-enable your non-MS services
and Startup tab programs and restore your normal msconfig configuration
after cleaning your machine.

4. Click OK and then reboot.

For additional information about how to clean boot your operating system,
click the following article links to view the articles in the Microsoft
Knowledge Base:

310353 How to Perform a Clean Boot in Windows XP
http://support.microsoft.com/kb/310353
281770 How to Perform Clean-Boot Troubleshooting for Windows 2000
http://support.microsoft.com/kb/281770/EN-US/
267288 How to Perform a Clean Boot in Windows Millennium Edition
http://support.microsoft.com/kb/267288/EN-US/
192926 How to Perform Clean-Boot Troubleshooting for Windows 98
http://support.microsoft.com/kb/192926/EN-US/
243039 How to Perform a Clean Boot in Windows 95
http://support.microsoft.com/kb/243039/EN-US/


I did a little research about this Trojan, Downloader.Generic.ML, but
couldn't find any information under that name from _any_ of my available
resources (including Grisoft, BTW), nor about your aberrant c:\null file. I
would wonder if this is any sort of possible byproduct of some legitimate
software heuristically detected by a (recent?) AVG update.

Anyhow, try A2 and post back, please.
 
J

Jim Byrd

Ron - In addition to my previous post - FWIW, several MVP's are reporting on
one of my private lists that numerous "false positives" are showing up with
the last but one (two?) AVG update. Evidently there are two very recent
"replacement" updates available now (although you will have to manually
download them I'm told) to address the problem.
 
R

Ron Reaugh

-snip but not ignored

This instance is W98se.
I did a little research about this Trojan, Downloader.Generic.ML, but
couldn't find any information under that name from _any_ of my available
resources (including Grisoft, BTW),

Me too. Google groups and web shows only this thread as I said in an
earlier post. Grisoft and Trend show nothing.
nor about your aberrant c:\null file.

Me too including following someone's advice and checked the date 5/5/5 and
found NO other files on the system of that date. I may be a target of
something and next year they'll do me on 666<g>.
As I mentioned earlier, the file(c:\null) is still in AVG's virus vault.
Last night before the overnight SysClean run AVG 'extract as' hung while
trying to see if I could get c:\null out to forward to the url provided in a
post early in this thread. Just tried 'extract as' again and it's hanging
again. There's a dialog box, that I assume is the normal file save/open
dialog box, that has border and internal margins painted but otherwise is
all white. I continue to compose this message while it's just sitting
there. Ctl-Alt-Del shows the task AVG virus vault (not responding).
ANYONE?

Is there any way to clean boot access AVG's virus vault?
I
would wonder if this is any sort of possible byproduct of some legitimate
software heuristically detected by a (recent?) AVG update.

Yes but then there's that sudden detection that appears NOT to correspond to
any event related to that theory. It was the AVG resident shield after
W98SE is all up but only a little while thereafter. I had time to go into
OE6 and into NGs(AMD K6+ 450Mhz, 256MB).

Is AVG periodically checking c:\ or must that kind of -on the run- detection
by AVG due to it's having detected some file I/O with the file c:\null at
that moment? The file c:\null is unknown to me nor does 5/5/5 mean anything
to me except for the numerology of it and there was NO system activity that
related to the issue EXCEPT possibly that was when AVG finished doing it's
daily def update. BUT even then what triggered the detection at that
moment? I didn't run anykind of manual scan or such.
Anyhow, try A2 and post back, please.

OK!
 
R

Ron Reaugh

Jim Byrd said:
Ron - In addition to my previous post - FWIW, several MVP's are reporting on
one of my private lists that numerous "false positives" are showing up with
the last but one (two?) AVG update. Evidently there are two very recent
"replacement" updates available now (although you will have to manually
download them I'm told) to address the problem.

Yes, in the middle of all this I read that thread about the Dell files and
AVG did detect several Dell files on this system. ALSO Trend Housecall 6.0
also detected one such Dell file here.

Back to my original issue, why would AVG be detecting c:\null at that
moment. What could have caused AVG resident to detect a file in c:\ at that
moment EXCEPT watching/checking some file I/O to that file at that moment?
 
R

Ron Reaugh

Correction: below in my prior post where I say 'extract as' should read
'restore as'.

UPDATE: 'restore as' in AVG continues to hang. 'restore' works. So I got
c:\null back and after some fussing around I got it on a floppy. Then I had
www.virustotal.com have a look at it and about half identified it and the
other half did NOT(included after these comments). At www.virustotal.com
the AVG was the day's before AVG version(6/14/05) and it did NOT find it so
the theory that a sudden identification of c:\null was due to the fact that
AVG's 6/15/05 def-s had just been downloaded seems more probable. After
getting auto updates from AVG does AVG automatically and immediately go out
and check the root(c:\) for virus files? I still don't understand exactly
why the identification occurred at the moment it did OTHER THAN actual file
I/O to c:\null at that moment?

Following the above mentioned steps involving using a DOS boot floppy to
copy to c:\null to another floppy, I've now have booted back to W98SE and
c:\null still sits there and AVG has NOT noticed it yet?? Of course there's
been no new AVG download/update in the last hour.

Is there anything special about the filename 'null' that would stifle
registry searches etc. for it? In DOS the filename 'nul' IS special. There
seems to be nothing in the registry relevant to a filename 'null'.

This is a report processed by VirusTotal on 06/17/2005 at 09:16:56 (CET)
after scanning the file "Null" file.
Antivirus Version Update Result
AntiVir 6.31.0.7 06.16.2005 TR/Dldr.QDown.S
AVG 718 06.14.2005 no virus found
Avira 6.31.0.7 06.16.2005 TR/Dldr.QDown.S
BitDefender 7.0 06.17.2005 Trojan.Downloader.Qdown.S
ClamAV devel-20050501 06.16.2005 Trojan.Downloader.Delf-94
DrWeb 4.32b 06.17.2005 Trojan.DownLoader.2632
eTrust-Iris 7.1.194.0 06.16.2005 no virus found
eTrust-Vet 11.9.1.0 06.16.2005 no virus found
Fortinet 2.35.0.0 06.17.2005 W32/QDown.S-tr
Ikarus 2.32 06.16.2005 no virus found
Kaspersky 4.0.2.24 06.17.2005 Trojan-Downloader.Win32.QDown.s
McAfee 4515 06.16.2005 no virus found
NOD32v2 1.1143 06.16.2005 Win32/TrojanDownloader.QDown.S
Norman 5.70.10 06.15.2005 no virus found
Panda 8.02.00 06.16.2005 Spyware/ISTbar
Sybari 7.5.1314 06.17.2005 Trojan-Downloader.Win32.QDown.s
Symantec 8.0 06.16.2005 no virus found
TheHacker 5.8-3.0 06.17.2005 no virus found
VBA32 3.10.3 06.16.2005 Trojan-Downloader.Win32.QDown.s
 
Z

Zvi Netiv

Ron Reaugh said:
It's the file C:\NULL

Suddenly shortly after cold boot my fully updated(WinUp) and patched W98se
PC reported the above noted infection. It's Grisoft free AVG with the
latest updates. This PC is also protected by ZoneAlarm, Belkin WiFi router
with firewall, SpyBot(resident). A normal Shutdown was done 12 hours
earlier with no indication of any problems. There are still no indications
of any problems EXCEPT that AVG claims it's found this trojan. There have
been no floppy operations/mounts, no CD operations/mounts and no downloads
and installs of anything since an hour before shutdown last night and now.

From the DOS prompt I can see a file C:\NULL that has a 5/5/05 date. Since
5/5 both a full manual AVG and Trend HouseCall 6 run have been done on this
PC finding nothing.

What was the file size? I suppose you didn't view the file with a text editor
(e.g. Notepad). You would risk nothing by viewing the file as it didn't have an
executable extension (unless it was a PIF file, which wouldn't show in Explorer,
but you could know that from the file's icon - 'pif' have the MS-DOS icon, by
default). If you had viewed the file then you may have discovered the reason
for which AVG flagged it as a Trojan.

My guess is that the "NULL" file was the product of a piping command that was
misspelled 'null' instead of NUL (e.g. "whatever > nul"). This technique is
often used in scripts to not display pointless DOS screens. Misspelling the NUL
device as NULL is rather common.
So where and how did this file C:\NULL that AVG claims is Trojan horse
Downloader.Generic.ML appear from? Was it really there since 5/5 but went
unnoticed by both AVG and Trend HouseCall 6 and then this morning AVG
suddenly downloaded a new definition file which started seeing this trojan?
OR did something penetrate all the firewalls and suddenly spawn this file
which AVG quickly recognized?

There is no proof that the NULL file contained virus/Trojan code. The fact that
AVG found some Trojan in it proves nothing (FWIW, AVG fared rather bad in false
positives susceptibility that I conducted (see message
What likely happened here?

Just a false positive. Besides, what for is the AVG *on-access* waste time and
resources on checking an non-executable file like NULL?
The operation I was in the middle of when AVG popped up was reading a text
only no attachment NG message in OE 6.00.2800.1123.

Doesn't seem connected.

Regards, Zvi
 
J

Jason Edwards

Ron Reaugh said:
"Some time ago" seems to be confirming what I said.

Now did your test PC have a then current virus checker and a then current
firewall?

Yes it had a virus checker with all updates.
Yes it had all Windows updates.
If by firewall you mean personal firewall software then no it didn't because
this would have made no difference.
Personal firewalls do not stop Internet Explorer downloading whatever the
user requests as far as I'm aware.
They also do not stop Internet Explorer downloading something the user
didn't request.
The only way to keep addware off Windows 98 is to stop it reaching the PC.
click.


OK. so I assume you finished the experiment and can tell us when "two
popular virus scanners" DID start finding it?

As already stated the fully updated scanners were not finding anything wrong
with the file after a week.
I then decided to get rid of the file in case it was detected and frightened
anyone in the future.
I'm not in the business of collecting malware.
It would surprise me if current virus scanners don't detect it but there is
no way for me to find out.
"never" implies incompetence/fraud or that the infection was a very special
one target thing.

Using the current model of anti-virus software I don't see how any virus
scanner vendor can be expected to get an update done and distributed to
users before malware has executed on their PC.
This is simply not possible unless they turn their efforts to time travel
instead of malware detection.
I cannot recall a virus I came across this year which hadn't executed and
done damage to a user's PC BEFORE their virus scanner was updated to detect
it. The last one was due to a 12 year old using MSN messenger in an XP
administrator account. This left the user helpless because task manager
wouldn't run and IE wouldn't go to any anti-virus sites. AVG took more than
24 hours to start detecting it and I don't see how they could have done it
any faster.
Is it only me who thinks that there may be something wrong with this model?
when


OK, so tell us all the secret solution save the daily clean OS install that
seems so popular here

There are no secrets.
Ask yourself why businesses of any size don't use (or shouldn't be using)
the current home user model.
Ask yourself why users in these businesses who have email and web browsing
access think that they have full Internet access and don't notice any
difference between Internet access at work and Internet access at home.
A few of these users may wonder why they never get any viruses at work but
can't keep viruses off their home PC.
From the DOS prompt I can see a file C:\NULL that has a 5/5/05 date.
Since
5/5 both a full manual AVG and Trend HouseCall 6 run have been done
on
this
PC finding nothing.

So where and how did this file C:\NULL that AVG claims is Trojan
horse
Downloader.Generic.ML appear from? Was it really there since 5/5
but
went
unnoticed by both AVG and Trend HouseCall 6 and then this morning
AVG
suddenly downloaded a new definition file which started seeing this
trojan?

Virus scanners don't have any magical ability to detect trojans, they
have
to be told what is a trojan and what isn't via the updates.

Right but 5/5/05 is over 30 days old...am I some special case alpha
infection point?

Nope, you're just an average Windows user who got the trojan that wasn't
widespread enough to be noticed immediately.

I find that unlikely but barely possible.

Barely possible would be more than enough for me. I'd rather make it
impossible. To do that you arrange to prevent any executable code getting
where you don't want it. This is likely to be impossible with a Windows 98
PC connected directly to a broadband connection where everything has
complete access to everything else.
Consider an external firewall box which stops it getting to the PC in the
first place.
An anti-virus
vendor may manage to do an update in less that a day if the
virus/trojan
is
all over the news but it may otherwise take longer. Trojan
writers
are
not
under any obligation to send copies of their trojans to anti-virus
vendors.

OR did something penetrate all the firewalls and suddenly
spawn
this
file
which AVG quickly recognized?

I have no idea where C:\NULL came from but if it were on my PC I would
want
to know what it was.
If I was sitting at the PC which had C:\NULL on it then I'd look in
C:\NULL
to see what was there.

After one noticed it. I don't inspect c:\ or c:\win or
c:\win\system[32]
hourly to spot undesirable files. That's what I got AVG etc. for.

I don't either, but I don't allow additional executable files on to the
system in the first place, so I don't have to go file spotting very often
on
my own machines. I also don't need AVG.


I'd also find out whether anything in there was referenced during
startup.
For that I'd need spybot S&D in advanced mode or
http://www.hijackthis.de/
or just regedit.


What likely happened here?

Impossible to say. One possibility is that you got something via an
unpatched IE vulnerability.

I was under the impression that there weren't any of these that have
resulted in actual infections any time recently. Lots of new
vulnerabilities keep being found and reported and fixed. And
that's
all
before there is any infections/penetrations using them and that's what
I've
been hearing for over a year.

Who have you been hearing this from?

Where have you been hearing the other from?

Ask yourself why there is a cumulative update every month.

YES, please do so. Have you been reading about the intense
preemptive
work
going on to find the holes before the hackers. From what I've heard that's
been effective down to with a day or two for the last year or two.
References otherwise?

How about the experiment I did with the isolated windows 98 PC described
above.


"Some time ago"....

Why does it make a difference?
All Windows and anti-virus updates were in place at the time.
HMM, now that sounds like something I'd say.

Filter it out before it reaches the PC.
YES, now if someone would care to describe in more detail why that came to
pass rather than hyperbole and paranoid rantings then I'd be happy. Is that
protection model many are using totally bogus?

There are various reasons why the current home user model is not likely to
change any time soon.
I'll list a few of the reasons I can think of, there may be many others.

1. Cost. Proper external firewall/proxy boxes start at three figures.
2. Time and effort. Good external boxes can be made out of free software and
an old PC, but time and effort is required to set it up. A certain level of
knowledge is also required for successful configuration whether you use a
ready made solution or a free software one. You can pay someone to do it for
you but then we're back to cost.
3. Knowledge. Windows 98 is not likely to be possible to secure for the
average home Windows user if connected directly to broadband. Later versions
of Windows are better but cannot be used in a secure manner because this
breaks too many existing applications. Windows applications are still being
written which require access to more than they should be able to access if
they are to work properly. I won't bother stating that you could use an
operating system other than Windows because I've met people who think that
Windows and computers are the same thing.

Jason
 
R

Ron Reaugh

So I ran A2 and it found ~130 things....mostly cookies which don't really
count as everything finds cookies. It also found my same old
c:\null(Trojan-Downloader.Win32.QDown.s) and two dialers plus
(TrojanSpy.Win32.KeyLogger.t). I gonna leave c:\null there awhile and try
to determine the circumstances that it's detected next time.
 
Z

Zvi Netiv

Ron Reaugh said:
Correction: below in my prior post where I say 'extract as' should read
'restore as'.

UPDATE: 'restore as' in AVG continues to hang. 'restore' works. So I got
c:\null back and after some fussing around I got it on a floppy.

What is the file size? Since it doesn't have an executable extension then it
would be safe to handle. View it with a text editor and tell us what it
contains. I suspect that it has script like text inside.

Would you mind sending it to my e-mail address (see my signature) for analysis?
Preferably in ZIP encapsulation, no need for password encryption. You may need
to disable your AV momentarily in order to send the file.
Then I had
www.virustotal.com have a look at it and about half identified it and the
other half did NOT(included after these comments).

Unsurprisingly, the scanners that "found" the Trojan in your upload to
VirusTotal, are the same that showed more susceptible than others to false
positives, in my tests.
At www.virustotal.com
the AVG was the day's before AVG version(6/14/05) and it did NOT find it so
the theory that a sudden identification of c:\null was due to the fact that
AVG's 6/15/05 def-s had just been downloaded seems more probable. After
getting auto updates from AVG does AVG automatically and immediately go out
and check the root(c:\) for virus files? I still don't understand exactly
why the identification occurred at the moment it did OTHER THAN actual file
I/O to c:\null at that moment?

Since this behavior is systematic, and is detected by AVG's on-access, then the
logical explanation would be that piping to the "NULL" file is caused by what
you were doing.
Following the above mentioned steps involving using a DOS boot floppy to
copy to c:\null to another floppy, I've now have booted back to W98SE and
c:\null still sits there and AVG has NOT noticed it yet?? Of course there's
been no new AVG download/update in the last hour.

I suppose you haven't tried "NOTEPAD C:\NULL." (note the dot after NULL) from
your desktop "run". I am pretty sure it will trigger AVP. ;-)

On a side note I would add that if you had InVircible installed, then you could
know exactly, in seconds, what is the application that generates the piping, or
accesses the file. But this is an entirely different discussion.
Is there anything special about the filename 'null' that would stifle
registry searches etc. for it? In DOS the filename 'nul' IS special. There
seems to be nothing in the registry relevant to a filename 'null'.

There is nothing special nor magic in the filename, except that it is a common
misspelling of the NUL device name, often used to redirect commands that need to
execute in the command/CMD shell.

An informed interpretation of the VirusTotal report suggests that you are
dealing with a false positive. For the readers' convenience, I have reorganized
the scanners in the report below into two groups: Those that false alarmed on
the NULL sample, and those that didn't. As to AVG, you may add it to the first
group as it eventually alarmed on that sample, which concurs with my tests (AVG
had about 40% susceptibility, with ClamAV being the worst - 100% susceptibility
to my samples).
This is a report processed by VirusTotal on 06/17/2005 at 09:16:56 (CET)
after scanning the file "Null" file.
Antivirus Version Update Result
AntiVir 6.31.0.7 06.16.2005 TR/Dldr.QDown.S
Avira 6.31.0.7 06.16.2005 TR/Dldr.QDown.S
BitDefender 7.0 06.17.2005 Trojan.Downloader.Qdown.S
ClamAV devel-20050501 06.16.2005 Trojan.Downloader.Delf-94
DrWeb 4.32b 06.17.2005 Trojan.DownLoader.2632
Fortinet 2.35.0.0 06.17.2005 W32/QDown.S-tr
Kaspersky 4.0.2.24 06.17.2005 Trojan-Downloader.Win32.QDown.s
NOD32v2 1.1143 06.16.2005 Win32/TrojanDownloader.QDown.S
Panda 8.02.00 06.16.2005 Spyware/ISTbar
Sybari 7.5.1314 06.17.2005 Trojan-Downloader.Win32.QDown.s
TheHacker 5.8-3.0 06.17.2005 no virus found VBA32 3.10.3 06.16.2005 Trojan-Downloader.Win32.QDown.s
AVG 718 06.14.2005 no virus found
eTrust-Iris 7.1.194.0 06.16.2005 no virus found
eTrust-Vet 11.9.1.0 06.16.2005 no virus found
Ikarus 2.32 06.16.2005 no virus found
McAfee 4515 06.16.2005 no virus found
Norman 5.70.10 06.15.2005 no virus found
Symantec 8.0 06.16.2005 no virus found

The critical question to ask in the above example is: Why wasn't the sample
detected by ALL scanners, given that those that detect it have it in their
database (Downloader.S is roughly one year old!).

I'll repeat something I said in a previous post and thread, about susceptibility
to FP: It tells a lot about the design internals of the product.

Regards, Zvi
 
J

Jim Byrd

OK, Ron - If you got that from A2 then I would believe a real infection
which, when you're ready, you can have A2 try and clean. I would recommend
two additional steps at this point if you wish to continue to investigate.

First, download and run Mark Russinovich's rootkitrevealer from
www.sysinternals.com.

Then, I would also download and run HiJackThis and post your results to one
of the forums. There are experts there who can help you considerably with
this:


Download HijackThis, free, here:

http://209.133.47.200/~merijn/files/HijackThis.exe (Always download a new
fresh copy of HijackThis [and CWShredder also] - It's UPDATED frequently.)

You may also get it here if that link is blocked:

http://www.majorgeeks.com/downloadget.php?id=3155&file=3&evp=3304750663b552982a8baee6434cfc13
or here: http://www.bleepingcomputer.com/files/spyware/hijackthis.zip
or here: http://thespykiller.co.uk/files/HJTsetup.exe

There's a good "How-to-Use" tutorial here:
http://computercops.biz/HijackThis.html

In Windows Explorer, click on Tools|Folder Options|View and check "Show
hidden files and folders" and uncheck "Hide protected operating system
files". (You may want to restore these when you're all finished with
HijackThis.)

Place HijackThis.exe or unzip HijackThis.zip into its own dedicated folder
at the root level such as C:\HijackThis (NOT in a Temp folder or on your
Desktop), reboot to Safe mode, start HT (have ONLY HT running - IE MUST be
closed) then press Scan. Click on SaveLog when it's finished which will
create hijackthis.log. Now click the Config button, then Misc Tools and
click on Generate StartupList.log which will create Startuplist.txt.

Then go to one of the following forums:

Spyware and Hijackware Removal Support, here:
http://216.180.233.162/~swicom/forums/

or Net-Integration here:
http://www.net-integration.net/cgi-...86d536d57b5f65b6e40c55365e;act=ST;f=27;t=6949

or Tom Coyote here: http://forums.tomcoyote.org/index.php?act=idx

or Jim Eshelman's site here: http://forum.aumha.org/

or Bleepingcomputer here: http://www.bleepingcomputer.com/


Register if necessary, then sign in and READ THE DIRECTIONS at the beginning
of the particular sites HiJackThis forum, then copy and paste both files
into a message asking for assistance, Someone will answer with detailed
instructions for the removal of your parasite(s). Be sure you include at
the beginning of your post "What problem(s) you're trying to solve" and
"What steps you've already taken."
 
G

Gabriele Neukam

On that special day, Ron Reaugh, ([email protected]) said...
AH, yes a horribly paranoid clean install and burn the backups article(yes
read it) by someone who should by off with Descartes looking for the evil
demons. I say "It boots and surfs so therefore it is." Now lets's make it
do it better and catch those nasty lurking litte demons and exorcise
them....after all I don't have launch codes on this system.

Do you really prefer to have even more "typhoid Marys" on the net, than
are already existing? Better do a thorough disinfection. As Virus
scanners aren't always perfect, this might even mean a surgery. (FYI:
Typhus abdominalis bacteria often hide in the gall bladder)


Gabriele Neukam

(e-mail address removed)
 
R

Ron Reaugh

Zvi Netiv said:
What is the file size?
48,128

Since it doesn't have an executable extension then it
would be safe to handle. View it with a text editor and tell us what it
contains. I suspect that it has script like text inside.

Would you mind sending it to my e-mail address (see my signature) for analysis?

OK!

Preferably in ZIP encapsulation, no need for password encryption. You may need
to disable your AV momentarily in order to send the file.


Unsurprisingly, the scanners that "found" the Trojan in your upload to
VirusTotal, are the same that showed more susceptible than others to false
positives, in my tests.


Since this behavior is systematic, and is detected by AVG's on-access, then the
logical explanation would be that piping to the "NULL" file is caused by what
you were doing.


c:\null is still there. Today AVG updated and nothing happened. I'm
assuming therefore that in the original incident that some I/O did occur to
c:\null and that I/O was from out of left field. Nothing was supposed to be
doing that.
I suppose you haven't tried "NOTEPAD C:\NULL." (note the dot after NULL) from
your desktop "run". I am pretty sure it will trigger AVP. ;-)


That triggers AVG. What is the significance of the 'dot'?
On a side note I would add that if you had InVircible installed, then you could
know exactly, in seconds, what is the application that generates the piping, or
accesses the file. But this is an entirely different discussion.


There is nothing special nor magic in the filename, except that it is a common
misspelling of the NUL device name, often used to redirect commands that need to
execute in the command/CMD shell.

An informed interpretation of the VirusTotal report suggests that you are
dealing with a false positive. For the readers' convenience, I have reorganized
the scanners in the report below into two groups: Those that false alarmed on
the NULL sample, and those that didn't. As to AVG, you may add it to the first
group as it eventually alarmed on that sample, which concurs with my tests (AVG
had about 40% susceptibility, with ClamAV being the worst - 100% susceptibility
to my samples).

Trojan-Downloader.Win32.QDown.s

The critical question to ask in the above example is: Why wasn't the sample
detected by ALL scanners, given that those that detect it have it in their
database (Downloader.S is roughly one year old!).

Aren't the critical questions: Why is Kaspersky in the group that found it?
Why did AVG suddenly start detecting it? So you seem to be saying that AVG
updated its def-s to suddenly start false positive detecting a known
year-old trojan? AND on the date of that new buggy update it just happens
that I get from left field some file I/O to c:\null and a false positive. I
think that there is a more likely explanation than that.
 
R

Ron Reaugh

Jim Byrd said:
OK, Ron - If you got that from A2 then I would believe a real infection
which, when you're ready, you can have A2 try and clean.

Well I thought it was already cleaned...well. It wanted to delete c:\null
but I said no for now. I did let it delete all the other stuff. Is there
some whole other step that I'm missing? I will say that after the A2 run
and deletions that something is different....BETTER. Does it do more than
advertised?
I would recommend
two additional steps at this point if you wish to continue to investigate.

OH SHIT, you're trying to send me on a whole new career path. I was
pleased as punch when Gates saved the world from NetRoom and Stacker
hell....I did that career path fully. Please Billy save us all and start
including a robust equivalent set of tools/fixes in SP3 or maybe that new
service that's coming! This is going out of control. How can the average
PC user hope to survive? Billy needs to save em all again. In the mean
time the Geek Squad can't hope to handle such so they'll just have to keep
payin folks like me $100/hr. to keep there PCs running. Most don't. Most
don't keep running....they just buy a new PC.....I wonder if mikey is
financing the malware industry said:
First, download and run Mark Russinovich's rootkitrevealer from
www.sysinternals.com.

I DON'T WANNA! But the I really didn't wanna screw with A2 either and look
what happened. I have fastidiously avoided HiJackThis for several years
now. I don't wanna go here. I want something to just handle it
all...damnit.
Then, I would also download and run HiJackThis and post your results to one
of the forums. There are experts there who can help you considerably with
this:


Download HijackThis, free, here:

http://209.133.47.200/~merijn/files/HijackThis.exe (Always download a new
fresh copy of HijackThis [and CWShredder also] - It's UPDATED frequently.)

You may also get it here if that link is blocked:

http://www.majorgeeks.com/downloadget.php?id=3155&file=3&evp=3304750663b552982a8baee6434cfc13
or here: http://www.bleepingcomputer.com/files/spyware/hijackthis.zip
or here: http://thespykiller.co.uk/files/HJTsetup.exe

There's a good "How-to-Use" tutorial here:
http://computercops.biz/HijackThis.html

In Windows Explorer, click on Tools|Folder Options|View and check "Show
hidden files and folders" and uncheck "Hide protected operating system
files". (You may want to restore these when you're all finished with
HijackThis.)

Place HijackThis.exe or unzip HijackThis.zip into its own dedicated folder
at the root level such as C:\HijackThis (NOT in a Temp folder or on your
Desktop), reboot to Safe mode, start HT (have ONLY HT running - IE MUST be
closed) then press Scan. Click on SaveLog when it's finished which will
create hijackthis.log. Now click the Config button, then Misc Tools and
click on Generate StartupList.log which will create Startuplist.txt.

Then go to one of the following forums:

Spyware and Hijackware Removal Support, here:
http://216.180.233.162/~swicom/forums/

or Net-Integration here:
http://www.net-integration.net/cgi-...86d536d57b5f65b6e40c55365e;act=ST;f=27;t=6949

or Tom Coyote here: http://forums.tomcoyote.org/index.php?act=idx

or Jim Eshelman's site here: http://forum.aumha.org/

or Bleepingcomputer here: http://www.bleepingcomputer.com/


Register if necessary, then sign in and READ THE DIRECTIONS at the beginning
of the particular sites HiJackThis forum, then copy and paste both files
into a message asking for assistance, Someone will answer with detailed
instructions for the removal of your parasite(s). Be sure you include at
the beginning of your post "What problem(s) you're trying to solve" and
"What steps you've already taken."


--
Regards, Jim Byrd, MS-MVP
My, Blog Defending Your Machine, here:
http://defendingyourmachine.blogspot.com/

Ron Reaugh said:
So I ran A2 and it found ~130 things....mostly cookies which don't
really count as everything finds cookies. It also found my same old
c:\null(Trojan-Downloader.Win32.QDown.s) and two dialers plus
(TrojanSpy.Win32.KeyLogger.t). I gonna leave c:\null there awhile
and try to determine the circumstances that it's detected next time.
 
R

Ron Reaugh

Gabriele Neukam said:
On that special day, Ron Reaugh, ([email protected]) said...


Do you really prefer to have even more "typhoid Marys" on the net, than
are already existing?

Wrong question. Did some say "Now lets's make it do it better and catch
those nasty lurking litte demons and exorcise them....after all I don't have
launch codes on this system."
Better do a thorough disinfection. As Virus
scanners aren't always perfect, this might even mean a surgery. (FYI:
Typhus abdominalis bacteria often hide in the gall bladder)

Do they? Descartes couldn't be certain of that.
 
R

Roger Wilco

Number of users vs time seems quite a different thing.

How do you figure that?

It takes time for users to report their experiences to the fighters (and
submit samples of the malware) - and further time for the fighters to
analyse the software threat and create a suitable detection definition.
I thought they protected against virus like behavior.

Some do to some extent - Norman's Sandbox does IIRC. Zvi Netiv's site at
Net-Z Computing gives good information on some alternatives to using
only signature based scanning.
AH, how about ZoneAlarm???

Many software firewalls have gone beyond what they used to do (port
control) and it could be that ZA does do something about your system
configuration settings - I don't know about that because I don't use it.
scrutiny.:(

HMM, it seems to be in AVG's virus vault but the extraction (Save As..)
hangs.

Isn't there a restore option in AVG's console?

BTW - did you search for other files with that creation date for clues
to see if it was something you forgot that you had installed? Someone
else has mentioned an ATA card or something, but just because you don't
have what he mentioned doesn't mean that you didn't install something
else that used the same installer (that apparently leaves remnants).
 
R

Ron Reaugh

Roger Wilco said:
How do you figure that?

It takes time for users to report their experiences to the fighters (and
submit samples of the malware) - and further time for the fighters to
analyse the software threat and create a suitable detection definition.


Hours or a day or two seems to be what's happening.
Some do to some extent - Norman's Sandbox does IIRC. Zvi Netiv's site at
Net-Z Computing gives good information on some alternatives to using
only signature based scanning.


Billy please save us.
Many software firewalls have gone beyond what they used to do (port
control) and it could be that ZA does do something about your system
configuration settings - I don't know about that because I don't use it.


Isn't there a restore option in AVG's console?


'restore as' hangs...'restore' works and I submitted to www.virustotal.com
.....see my other posts.
BTW - did you search for other files with that creation date for clues
to see if it was something you forgot that you had installed? Someone
else has mentioned an ATA card or something, but just because you don't
have what he mentioned doesn't mean that you didn't install something
else that used the same installer (that apparently leaves remnants).

As I already posted...no other file in the system has 5/5/5...but I noticed
that date at the time.....wait til next year<G>.
 
R

Roger Wilco

Ron Reaugh said:
Recommended by who?

Security experts, generally.
Are you saying that all this virus checkers and
cleaners/disinfectors are frauds as that can't possibly work
reliably??

No, but they can only correct what they know how to correct - and as a
prerequisite you have to have a known malware to have them correct. As
your problem is an unknown you must have a lowered confidence in the
state of your security. Sure, it is relatively easy to remove a PE
infector that only infects PE files in the working directory - replace
all files detected as infected with known good backups. A worm that
installs a backdoor and announces through IRC "open house" at IP address
xxx.xxx.xxx.xxx can be removed and you can still be confident to some
extent that little time was available for any further actual intrusion.
But a trojan downloader detection that doesn't tell you what was
downloaded and executed leaves a larger unknown element to the
effectiveness of your cleanup. "What ifs" become more important - like
'what if' the downloaded and executed program retrograded your patch
level by installing an older, broken ,version of a dll (with the new
version number to fool dumb baseline security checkers) so that even
after removing any active trojans you still have a trapdoor that allows
a cracker to run code and install something newer and maybe not known to
your scanners?.
If
so then I know how to build an app that can detect any infection...I assumed
that such had already been done. Start with an app that does somekind of a
fancy encrypted CRC of all the relevant files on a HD and then it keeps an
encrypted database of same for later comparison...I didn't say it was
pretty.

Integrity checkers are also a good tool, unfortunately some malware can
pad out the file to achieve a good CRC after it has done the
modification - not very common though
Clean install isn't a rational/reasonable option.

No, but sometimes it is the "only" option that works.
The same logic would
suggest that any backups be burned immediately....just NO.

Why do you say that? Sure, if you have been compromised long enough that
the backups are also affected, but a good backup regimen makes this very
unlikely.
 
J

Jim Byrd

Hi Ron - No, if you've already let A2 clean things (except c:\null?), then
that's OK, although I'd at least run it again and be sure it's still clean
in Safe or Clean Boot, then again after a normal boot (if you didn't already
do this). These things can often re-infect themselves.

As to rootkitresponder - it would be good IMO to increase your confidence
that this (a rootkit) hasn't happened, given the atypical circumstances of
your infection. But of course running this and using the HiJackThis
approach are entirely your choice. Those were just my recommendations,
since in my experience multiple tools can give more complete confidence in a
clean system, particularly when starting from an unknown infection point.
(For well know infections there often exist specific tools which are very
efficient in clean up that specifc malware.)

--
Regards, Jim Byrd, MS-MVP
My, Blog Defending Your Machine, here:
http://defendingyourmachine.blogspot.com/

Ron Reaugh said:
Jim Byrd said:
OK, Ron - If you got that from A2 then I would believe a real
infection which, when you're ready, you can have A2 try and clean.

Well I thought it was already cleaned...well. It wanted to delete
c:\null but I said no for now. I did let it delete all the other
stuff. Is there some whole other step that I'm missing? I will say
that after the A2 run and deletions that something is
different....BETTER. Does it do more than advertised?
I would recommend
two additional steps at this point if you wish to continue to
investigate.

OH SHIT, you're trying to send me on a whole new career path. I was
pleased as punch when Gates saved the world from NetRoom and Stacker
hell....I did that career path fully. Please Billy save us all and
start including a robust equivalent set of tools/fixes in SP3 or
maybe that new service that's coming! This is going out of control.
How can the average PC user hope to survive? Billy needs to save em
all again. In the mean time the Geek Squad can't hope to handle such
so they'll just have to keep payin folks like me $100/hr. to keep
there PCs running. Most don't. Most don't keep running....they just
buy a new PC.....I wonder if mikey is financing the malware
industry said:
First, download and run Mark Russinovich's rootkitrevealer from
www.sysinternals.com.

I DON'T WANNA! But the I really didn't wanna screw with A2 either
and look what happened. I have fastidiously avoided HiJackThis for
several years now. I don't wanna go here. I want something to just
handle it all...damnit.
Then, I would also download and run HiJackThis and post your results
to one of the forums. There are experts there who can help you
considerably with this:


Download HijackThis, free, here:

http://209.133.47.200/~merijn/files/HijackThis.exe (Always download
a new fresh copy of HijackThis [and CWShredder also] - It's UPDATED
frequently.)

You may also get it here if that link is blocked:
http://www.majorgeeks.com/downloadget.php?id=3155&file=3&evp=3304750663b552982a8baee6434cfc13
or here:
http://www.bleepingcomputer.com/files/spyware/hijackthis.zip
or here: http://thespykiller.co.uk/files/HJTsetup.exe

There's a good "How-to-Use" tutorial here:
http://computercops.biz/HijackThis.html

In Windows Explorer, click on Tools|Folder Options|View and check
"Show hidden files and folders" and uncheck "Hide protected
operating system files". (You may want to restore these when you're
all finished with HijackThis.)

Place HijackThis.exe or unzip HijackThis.zip into its own dedicated
folder at the root level such as C:\HijackThis (NOT in a Temp folder
or on your Desktop), reboot to Safe mode, start HT (have ONLY HT
running - IE MUST be closed) then press Scan. Click on SaveLog when
it's finished which will create hijackthis.log. Now click the Config
button, then Misc Tools and click on Generate StartupList.log which
will create Startuplist.txt.

Then go to one of the following forums:

Spyware and Hijackware Removal Support, here:
http://216.180.233.162/~swicom/forums/

or Net-Integration here:
http://www.net-integration.net/cgi-...86d536d57b5f65b6e40c55365e;act=ST;f=27;t=6949
or Tom Coyote here: http://forums.tomcoyote.org/index.php?act=idx

or Jim Eshelman's site here: http://forum.aumha.org/

or Bleepingcomputer here: http://www.bleepingcomputer.com/


Register if necessary, then sign in and READ THE DIRECTIONS at the
beginning of the particular sites HiJackThis forum, then copy and
paste both files into a message asking for assistance, Someone will
answer with detailed instructions for the removal of your
parasite(s). Be sure you include at the beginning of your post
"What problem(s) you're trying to solve" and "What steps you've
already taken."
 
R

Roger Wilco

Ron Reaugh said:
Google what exactly?


Define "compromised"?

I would define a compromised system as one that has an ongoing or
repeatable security breach. Ongoing as in an active trojan, and
repeatable as in a trapdoor that allows the attacker to re-enter the
system after you thought you had secured it.
Define "known good"!

Backups made before any malware could have had access to it or from a
read only media so that malware couldn't have had such access. An
install CD with slipstreamed patches and copies of the original
application software could qualify - but this is highly subjective
because 'known good" isn't always good in practice.
That's the catch 22. If one's virus checkers weren't up to detecting it
before/at the fact then why be confident that "test it, check it etc etc."
has any meaning.

Maybe now they have added detection for that which has affected tha data
store.
Fixing the sytem in place is the much more reasonable route. That of course
assumes that there are competent and effective tools to help one do
that.

The best tools are the ones that help you to prevent having to use
recovery tools.
The conclusion one might draw from what you and a few others have been
saying is that no such tools exist?

Exactly - no tools exist to fix unknown problems.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top