PDA

View Full Version : Spybot should detect & remove these rootkits:



SpySentinel
2007-01-06, 04:23
Spybot should detect & remove these rootkits:

1) Rootkit.hearse

It attempts to download several pieces of Spyware, Adware, and Trojans, in addition to the rootkit. The rootkit has two pieces: the first piece is a device driver named 'zopenssld.sys', and a DLL named 'zopenssl.dll'. The device driver appears to cloak any file named 'zopenssld.sys' or 'zopenssl.dll' regardless of where they reside, though the malicious versions are located in the System32 folder. While the DLL was invisible on the file system, it is visible as an injected DLL in many running processes. Since zopenssl.dll registers itself as a Winlogon.exe extension and does not run as a process, most users would never see it, and it can survive even in safe mode. he Trojan appears not to be active at all times, but it does wake up and start communicating when it sees a user browsing to a website that requires authentication. To view it in action, a virtual machine was infected with the rootkit and Trojan, and then the user browsed to hxxx://bankofamerica.com, and entered a fake username and password. All of the network traffic was recorded, and after ending the web browser session, the Trojan communication became apparent. After further investigation, it was determined that this Malware was sending information to a web server located in Russia. Ironically, this web server was not secured, and any user browsing the site could view the information that was being stolen.


2) Spybot - hpsebc08.exe and msdirectx.sys

Symptoms:

- cannot open Word or Excel
- machine hangs up
- Symantec crashes
- regedit and task manager closes immediately

Under:
HKLM\SOFTWARE\Windows\Microsoft\CurrentVersion\Run
HKLM\SOFTWARE\Windows\Microsoft\CurrentVersion\RunOnce

Is the value IPOT USB Service DRV32 which runs the file hpsebc08.exe. The file is hidden and located under c:\Windows\System32. If you do a search for hpsebc08, you'll also find a Prefetch file (.pf).

it drops, msdirectx.sys, which is detected as the generic "hacktool.rootkit". This virus attempts to connect to an outside server using IP address 140.123.176.237 with port 19899.

rene
2007-01-11, 17:48
Hello,

Rootkit.hearse has been added to the detection rules. Next week it will be addedt to the beta detection rules.

The other one i´m working on.

rene

7cures
2007-01-13, 21:57
Good for you. I knew there was no hypocrisy at safer networking. Now, a question. I go to the Secunia website regularly for updates on what bad stuff is out there. They are particularly good at rooting out exploits in the cyber world. Does Safer Networking use their system scan? I have, and it is very useful. It's a Java application, and is good at finding outdated app's.