{"id":582,"date":"2010-12-05T21:46:15","date_gmt":"2010-12-06T02:46:15","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=582"},"modified":"2010-12-05T21:46:15","modified_gmt":"2010-12-06T02:46:15","slug":"alureon-bootkit-trojan","status":"publish","type":"post","link":"http:\/\/www.wildow.com\/blog\/?p=582","title":{"rendered":"Alureon Bootkit Trojan"},"content":{"rendered":"<h3>Alureon Bootkit Trojan &#8211; Crossing the 64 bit Barrier<\/h3>\n<div>\n<div>\n<h2><em>There is a very prevalent rootkit (hidden malicious program) that has  been infecting Windows computers for quite some time now. The general name the <\/em><a href=\"http:\/\/www.microsoft.com\/security\/portal\/\"><em>Microsoft Malware  Protection Center<\/em><\/a><em> has assigned to this for-profit motivated threat  family is <\/em><a href=\"http:\/\/www.microsoft.com\/Security\/portal\/Threat\/Encyclopedia\/Entry.aspx?Name=Virus%3AWin32%2FAlureon.H#symptoms_link\"><em>Alureon<\/em><\/a><em>.<\/em><\/h2>\n<p><em><!--more--><br \/>\n<\/em><\/p>\n<p>The primary symptom of infection is<strong> browser redirects<\/strong> &#8211;  <strong>this means that your search results will take You to sites other than  the ones they should normally resolve to<\/strong>. Security companies and  researchers have a variety of names for this malicious program &#8211; while Microsoft  refers to it as<strong> Alureon<\/strong>,\u00a0 some call it <strong>TDSS<\/strong>,  some call it <strong>TDL#x<\/strong> where x represents the # of the variant  that&#8217;s detected.\u00a0 The most advanced and most insidious variant of this infection  is called TDL4.\u00a0 However, many if not most malware researchers have resisted  calling it TDL4, and still consider it to TDL3, because it&#8217;s infection cycle has  too much in common with its TDL3 predecessor to be labeled as a completely new  variant.<\/p>\n<p><strong>Over time, this rookit has progressively gotten more  and more crafty and it is now more difficult to detect and remove than it was  previously because it began to infect the Master Boot Record (MBR) on an  infected computer, making it technically a Bootkit.<\/strong> <strong>The MBR <\/strong>code is what enables your computer to boot up when your start it, and  if it is corrupted your computer may not boot at all.\u00a0 Because it is so vital to  the functioning of a Windows-based computer, Microsoft has provided Windows  users with recovery commands that run from the Windows Recovery Environment, to  replace the MBR with default Windows code appropriate to the Windows operating  system that&#8217;s installed.<\/p>\n<h2><strong>More recently, in early August 2010, a new Alureon TDL variant that  displayed the ability to infect Vista and Windows 7 64 bit based computers  emerged<\/strong>.<\/h2>\n<h3><strong>This was a very unsettling but significant development, because very  strict security measures that were integrated into\u00a0 64 bit versions of\u00a0 Vista  and Windows 7 (Patchguard and very stringent driver signing requirements) had to  be bypassed to allow this to happen!<\/strong><\/h3>\n<p>However, it&#8217;s important to note, the infection can only compromise a 64 bit  Windows 7 or Vista system,\u00a0 if\u00a0 User Account Control (UAC) is turned OFF or if  the user casually approves the malicious action.\u00a0 <strong>Since UAC is ON by  default, a user would either have to intentionally disable it, or approve a  questionable action initiated by malware (if it was ON), thereby leaving  themselves vulnerable to this type of exploit. <\/strong> When a user&#8217;s behavior  helps usher in a threat in this manner, the infection is said to rely upon  &#8220;social engineering&#8221; techniques to compromise a system! Though this rootkit also  infects 32 bit operating systems, it does so without initiating the automatic  reboot that&#8217;s required for it to circumvent the 64 bit operating system kernel  safeguards.\u00a0 On 64 bit systems, this random reboot may serve as a small clue  that something is amiss.<\/p>\n<h3>You can determine if your infected by opening Disk Management feature of the  Microsoft Computer Management Console.\u00a0 This can be done very quickly and  directly by doing the following::<\/h3>\n<h3>Click on the <strong>Start<\/strong> button -&gt; Choose the  <strong>Run<\/strong> option and type <strong>diskmgmt.msc,<\/strong> and click  <strong>OK<\/strong>.<\/h3>\n<h2>If your 64 bit Windows 7 or Vista system is infected by the Alureon Bootkit  (rootkit trojan),\u00a0 your system drive (normally C:) will NOT be visible:<\/h2>\n<ol>\n<li>\n<h2>Under the Disk Management functions of the <a href=\"http:\/\/www.windows7update.com\/Windows7-Computer-Management.html\">Computer  Management Console.<\/a><\/h2>\n<\/li>\n<li>\n<h2>When <a href=\"http:\/\/support.microsoft.com\/kb\/300415\">D<strong>iskpart<\/strong><\/a> is  run with the &#8220;list disk&#8221; directive to obtain a summary about each fixed disk in  the computer.<\/h2>\n<\/li>\n<\/ol>\n<h3><strong>On a clean system the primary drive is listed as so:<\/strong><\/h3>\n<h3><strong>DISKPART&gt; list disk<\/strong><\/h3>\n<h3><strong><br \/>\nDisk ###\u00a0 Status\u00a0\u00a0\u00a0\u00a0\u00a0 Size\u00a0\u00a0\u00a0\u00a0 Free\u00a0\u00a0\u00a0\u00a0 Dyn\u00a0 Gpt<\/strong><\/h3>\n<h3><strong> &#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;-\u00a0 &#8212;&#8212;-\u00a0 &#8212;&#8212;-\u00a0 &#8212;\u00a0 &#8212;<\/strong><\/h3>\n<h3><strong> Disk 0\u00a0\u00a0\u00a0 Online\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 112 GB\u00a0\u00a0\u00a0\u00a0\u00a0 0 B<\/strong><\/h3>\n<h3><strong> Disk 1\u00a0\u00a0\u00a0 Online\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 233 GB\u00a0\u00a0\u00a0\u00a0\u00a0 0 B<\/strong><\/h3>\n<h3><strong>________________________<\/strong><\/h3>\n<h2>On TDL3 X64 Alureon Bootkit infected system Diskpart will return the  following, as it does not see the primary drive:<\/h2>\n<h3><strong>DISKPART&gt;list disk<\/strong><\/h3>\n<h3><strong>There are no fixed disks to show.<\/strong><\/h3>\n<h2><em>These are unintentional  side effects of this critter that can be used to  check whether your system is infected!!<\/em><\/h2>\n<h2>Though it sounds pretty ominous, the Alureon MBR rootkit trojan can be  fixed quite easily by running the <strong>fixmbr<\/strong> command at the  <strong>Command Prompt <\/strong>by either booting to the <a href=\"http:\/\/support.microsoft.com\/kb\/314058\">Recovery Console<\/a> in Windows  XP\u00a0 , or the <a href=\"http:\/\/support.microsoft.com\/kb\/927392\">Windows Recovery  Environment<\/a> (Windows RE) in Windows Vista or Windows 7 through bootrec (Boot  Recovery):<\/h2>\n<h2><strong>In Windows XP &#8211; the command to issue is:<\/strong><\/h2>\n<h2>f<strong>ixmbr<\/strong><\/h2>\n<h2><strong>In Windows 7 and Vista &#8211; the command to issue is:<\/strong><\/h2>\n<h2><strong>bootrec.exe \/fixmbr <\/strong><\/h2>\n<p><strong>This Windows 7 Themes tutorial explains exactly how to access and  use the Windows 7 recovery options to repair the MBR via the Command  Prompt:<\/strong><br \/>\n<a href=\"http:\/\/windows7themes.net\/how-to-fix-mbr-in-windows-7.html\">http:\/\/windows7themes.net\/how-to-fix-mbr-in-windows-7.html<\/a><\/p>\n<p><strong>This  Bleeping Computer tutorial explains how to access\u00a0 the Command Prompt from the  Windows Vista Recovery Environment,after which fixmbr must be  run:<\/strong><br \/>\n<a href=\"http:\/\/www.bleepingcomputer.com\/tutorials\/tutorial147.html\">http:\/\/www.bleepingcomputer.com\/tutorials\/tutorial147.html<\/a><\/p>\n<h2><strong> <\/strong><strong>I recommend backing up your MBR, <\/strong>in the  interest of being &#8220;safe rather than sorry&#8221; &#8211; so you can restore an original copy  of that essential code, in the event your computer&#8217;s MBR should become  corrupted.<\/h2>\n<h3>You may rightly ask, <strong>&#8220;Why is it necessary to back-up my computer&#8217;s  MBR, if it&#8217;s so easy to repair it, by simply running the Fixmbr  command?&#8221;<\/strong> That&#8217;s a very good question, I would reply and <strong>now  I&#8217;ll elaborate on my response. <\/strong><\/h3>\n<h3>The reason it is better to repair a corrupted MBR by restoring it with a  backup of the original is because your MBR may contain <strong>customized  code<\/strong> that your Computer Manufacturer placed there to enable you to  access your computer&#8217;s recovery and restore options.<\/h3>\n<h3><strong>Many original equipment manufacturers (OEMs) have adopted the  practice of not including Windows installation media (DVDs )when you purchase a  computer from them, because they install a recovery partition instead.\u00a0 Booting  to the recovery partition (rather than booting to the Windows DVD), is how you  enter to the Windows Recovery Environment.\u00a0 Dell and Hewlett Packard (HP) are  two major computer manufacturers, among others, that install recovery\/restore  partitions rather than providing Windows installation disks. <\/strong><\/h3>\n<h2>If you use the <strong>fixmbr<\/strong> command it overwrites the MBR with  default Windows code.\u00a0 If the MBR contained proprietary OEM MBR code that  enabled your computer to access the recovery partition, then <strong>you will  lose the ability to access your computer&#8217;s recovery partition after using the  fixmbr command.\u00a0 That&#8217;s why restoring your MBR from an <span style=\"text-decoration: underline;\">original backup<\/span> is  preferable.<\/strong><\/h2>\n<h2>There are several programs that enable you to back up your MBR very easily  and I will name a couple I&#8217;ve tested.\u00a0 One of these programs, MBRCheck, can also  detect whether your computer&#8217;s MBR is infected, and if it is, it can restore it  with default Windows MBR code.<\/h2>\n<h3>It&#8217;s important to backup your MBR not just to your computer&#8217;s primary hard  drive but to a alternate media, such as a\u00a0 CDROM so it can be accessed even if  your system becomes unbootable.<\/h3>\n<h1><strong>Preventative Protection: <\/strong><\/h1>\n<h1><strong>Tools to Backup and Restore the MBR<\/strong><\/h1>\n<h1><strong>1.<a href=\"http:\/\/download.bleepingcomputer.com\/rootrepeal\/MBRCheck.exe\"> MBRCheck<\/a><\/strong><strong> by AD<\/strong><\/h1>\n<p><strong>MBRCheck is a tool created by AD aka Ad13, the author of <a href=\"http:\/\/sites.google.com\/site\/rootrepeal\/\">RootRepeal<\/a> an excellent  AntiRootkit detector.<\/strong><\/p>\n<p><strong>MBRCheck does the following when it is run (without command line  switches)<\/strong><\/p>\n<ol>\n<li>Checks the MBR for non-standard Code<\/li>\n<li>Creates a log<\/li>\n<li>Backs up (dumps) the MBR<\/li>\n<li>Gives you the option to restore the\u00a0 MBR (with a default Windows MBR) if  your computer&#8217;s MBR is found to be &#8220;non-standard&#8221;<\/li>\n<\/ol>\n<h3>Help File listing of MBRCheck commands:<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/secure-computer-solutions.com\/blog\/MBRCheckHelp.jpg\" border=\"0\" alt=\"MBRCheckHelp.jpg\" width=\"538\" height=\"348\" \/><\/p>\n<h3><strong>To check the MBR of your Primary Drive for MBR  modification:<\/strong><\/h3>\n<h3>Type MBRCheck and hit Enter<\/h3>\n<h3>This will invoke MBRCheck\u00a0 to execute with this default command line:<\/h3>\n<h3><strong>-s 0 -d dump.dat<\/strong><\/h3>\n<h3><strong>This causes the system drive MBR to be dumped to a file called  dump.dat and it also produces a log <\/strong><\/h3>\n<h3><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/secure-computer-solutions.com\/blog\/MBRCheckCMDWindow.jpg\" border=\"0\" alt=\"MBRCheckCMDWindow.jpg\" width=\"554\" height=\"359\" \/><\/h3>\n<h3>The MBRCheck log is created in the folder where the MBRCheck executable  resides (here the Desktop)<\/h3>\n<h3>After the identifying header information the log lists:\u00a0 loaded kernel  drivers, running processes, and it tells You that it has dumped the MBR in a  file called dump.dat:<\/h3>\n<h3><strong>The following text is excerpted from a MBRCheck log (driver and  process list has been truncated):<\/strong><\/h3>\n<p><strong> MBRCheck, version 1.2.3(c) 2010, AD<\/p>\n<p>Command-line:\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0  \u00a0-s 0 -d dump.dat<br \/>\nWindows Version:\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0Windows Vista Home Premium  Edition<br \/>\nWindows Information:\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0Service Pack 2 (build 6002),  32-bit<br \/>\nBase Board Manufacturer:\u00a0\u00a0 \u00a0Dell Inc.<br \/>\nBIOS Manufacturer:\u00a0\u00a0 \u00a0\u00a0\u00a0  \u00a0Dell Inc.<br \/>\nSystem Manufacturer:\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a0Dell Inc.<br \/>\nSystem Product Name:\u00a0\u00a0  \u00a0\u00a0\u00a0 \u00a0MXC062<br \/>\nLogical Drives Mask:\u00a0\u00a0 \u00a0\u00a0\u00a0 \u00a00x0000001c<\/p>\n<p>Kernel Drivers  (total 183):<br \/>\n0x8204A000 \\SystemRoot\\system32\\ntkrnlpa.exe<br \/>\n0x82017000  \\SystemRoot\\system32\\hal.dll<\/p>\n<p>Processes (total 61):<br \/>\n0 System  Idle Process<br \/>\n4 System<br \/>\n684 C:\\Windows\\System32\\smss.exe<br \/>\n800 csrss.exe<\/p>\n<p>Dumping \\\\.\\PhysicalDrive0 to dump.dat&#8230;<br \/>\nDumped  successfully!<\/p>\n<p>Just as the MBRCheck says &#8211; the MBR has been &#8220;dumped&#8221; to a  file called dump.dat on the Desktop<\/strong><\/p>\n<h3><strong>Backing up the MBRCheck is that EASY!!<\/strong><\/h3>\n<h1>Restoring the MBR with MBRCheck<\/h1>\n<h3>If MBRCheck returns the following notification:<\/h3>\n<h3><strong>Found non-standard or infected MBR<\/strong><\/h3>\n<h3>You&#8217;ll be prompted to hit Y (yes) to be presented with these &#8220;Additional  Options&#8221;<\/h3>\n<pre>[1] Dump the MBR of a physical disk to file<\/pre>\n<pre>[2] Restore the MBR of a physical disk with a standard boot code<\/pre>\n<pre>[3] Exit<\/pre>\n<p><strong>Choosing option [2] presents the following list of  operating systems<\/strong>:<strong>[ 0] Default (Windows Vista)<br \/>\n<\/strong><\/p>\n<p>[ 1] Windows XP<\/p>\n<p>[ 2] Windows Server 2003<\/p>\n<p>[ 3] Windows Vista<\/p>\n<p>[ 4] Windows 2008<\/p>\n<p>[ 5] Windows 7<\/p>\n<p>[-1] Cancel<\/p>\n<h3>Choosing &#8220;0&#8221; instructs\u00a0 MBRCheck to overwrite your MBR with a default  Windows MBR for your installed operating system\u00a0 (here Vista) upon reboot.<\/h3>\n<h2><strong>Do you want to fix the MBR code? \u00a0Type &#8216;YES&#8217; and hit ENTER to  continue: yes<\/strong><\/h2>\n<h2>Successfully wrote new MBR code!<\/h2>\n<h2>Please reboot your computer to complete the fix<\/h2>\n<h2><strong>2. <a href=\"http:\/\/dimio.altervista.org\/eng\/\">HDHacker<\/a> by Dimio <\/strong><\/h2>\n<h2><strong>To Backup the MBR: <\/strong><\/h2>\n<h3>Select the settings pictured in the image below:<\/h3>\n<h3><strong>Under the &#8220;Read Commands&#8221; section:<\/strong><\/h3>\n<h3>Click the <strong>&#8220;Read Sector from Disk&#8221; <\/strong>button, and the sector  image for MBR HardDisk0 will be displayed in the window.<\/h3>\n<h3><strong>Under the &#8220;Write Commands&#8221; section:<\/strong><\/h3>\n<h3>Select the <strong>&#8220;Save sector to file&#8221;<\/strong> button and by default,  your MBR will be saved to the following file within the HDHacker folder:<\/h3>\n<h2>MBR_HardDisk0.dat<\/h2>\n<h2><strong>To Restore the MBR (from MBR_HardDisk0.dat): <\/strong><\/h2>\n<h3>Select the settings pictured in the image below:<\/h3>\n<h3><strong>Under the &#8220;Read Commands&#8221; section:<\/strong><\/h3>\n<h3>Click the <strong>&#8220;Load Sector from File&#8221; <\/strong>button, and the sector  image for <strong>MBR HardDisk0.dat<\/strong> will be displayed in the  window.<\/h3>\n<h3><strong>Under the &#8220;Write Commands&#8221; section:<\/strong><\/h3>\n<h3>Select the <strong>&#8220;Write Sector on Disk&#8221;<\/strong> button and by default,\u00a0  the backed up MBR,<\/h3>\n<h3><strong>MBR HardDisk0.dat, will overwrite the MBR on the Logical  DriveC:<br \/>\n<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/secure-computer-solutions.com\/blog\/HDHackerGUI.JPG\" border=\"0\" alt=\"HDHackerGUI.JPG\" width=\"527\" height=\"548\" \/><\/p>\n<h2><strong>3. <a href=\"http:\/\/www2.gmer.net\/mbr\/\">Mbr.exe<\/a> by  Gmer<\/strong><\/h2>\n<h2><strong>Gmer&#8217;s mbr.exe is a versatile and effective command line tool that  can detect and repair a TDL infected MBR on all Windows platforms <span style=\"text-decoration: underline;\">including  the 64 bit versions of Windows<\/span>.\u00a0 Mbr.exe can also back-up the MBR, so it is  one of the most comprehensive and valuable programs to have when dealing with  the MBR Bootkit.<\/strong><\/h2>\n<h2><strong>Download <a href=\"http:\/\/www2.gmer.net\/mbr\/mbr.exe\">mbr.exe<\/a> to  your desktop.<\/strong><\/h2>\n<h2><strong>Open a Command Prompt (elevated in Vista and Windows 7) and issue  the following command <\/strong><strong>to view the mbr.exe help listing of  available switches and their output:<br \/>\n<\/strong><\/h2>\n<h2><strong>%userprofile%\\desktop\\mbr.exe -h<\/strong><\/h2>\n<h2>Help Listing:<\/h2>\n<h3>Stealth MBR rootkit\/Mebroot\/Sinowal\/TDL4 detector 0.4.1 by Gmer,  http:\/\/www.gmer.net<\/h3>\n<h3>Usage: mbr.exe [options]<\/h3>\n<h3>-f\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; fix mbr<\/h3>\n<h3>-c start_sector size_in_sectors filename\u00a0\u00a0\u00a0 &#8211; copy selected sectors to  file<\/h3>\n<h3>-t\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; trace called modules<\/h3>\n<h3>-k\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; list all disk devices<\/h3>\n<h3>-dPHYSICALDRIVE\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; set physical drive  numer<\/h3>\n<h3>-l logfile\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; specify log filename<\/h3>\n<h3>-s\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; disassembly unknown  hookers<\/h3>\n<h3>-u\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; unload driver<\/h3>\n<h3>\nsamples of usage:<\/h3>\n<h3>\nmbr.exe -c 0 1 copy_of_sector_00<\/h3>\n<h3>mbr.exe -c 0x3fdc80 0x1ca copy_of_mbr_rk<\/h3>\n<h3>mbr.exe -d0 -t<\/h3>\n<h2><strong>To have mbr.exe check your MBR for bootkit Infection:<\/strong><\/h2>\n<h2>Open a Command Prompt (elevated in Vista and Windows 7) and issue the  following command from your desktop:<\/h2>\n<h2><strong>&#8220;%userprofile%\\desktop\\mbr.exe&#8221; -t<\/strong><\/h2>\n<h2>A log is produced called <strong>mbr.log<\/strong> (in the same folder as  mbr.exe)<\/h2>\n<h2>If your MBR is clean the mbr.log will look like this:<\/h2>\n<h3><strong>C:\\&gt;%userprofile%\\desktop\\mbr.exe -t<\/strong><\/h3>\n<h3><strong>Stealth MBR rootkit\/Mebroot\/Sinowal\/TDL4 detector 0.4.1 by Gmer,  http:\/\/www.gmer.net<\/strong><\/h3>\n<h3><strong>Windows 6.0.6002 Disk: TOSHIBA_MK1234GSX rev.AH001D -&gt;  \\Device\\Ide\\IdeDeviceP0T0L0-0<\/strong><\/h3>\n<h3><strong>device: opened successfully<\/strong><\/h3>\n<h3><strong>user: MBR read successfully<\/strong><\/h3>\n<h3><strong>called modules: ntkrnlpa.exe hal.dll CLASSPNP.SYS disk.sys acpi.sys  dxgkrnl.sys<\/strong><\/h3>\n<h3><strong>igdkmd32.sys watchdog.sys win32k.sys win32k.sys<\/strong><\/h3>\n<h3><strong>1 ntkrnlpa!IofCallDriver[0x82080962] -&gt;  \\Device\\Harddisk0\\DR0[0x873ED640]<\/strong><\/h3>\n<h3><strong>3 CLASSPNP[0x82FA68B3] -&gt; ntkrnlpa!IofCallDriver[0x82080962]  -&gt; [0x845F0F08]<\/strong><\/h3>\n<h3><strong>kernel: MBR read successfully<\/strong><\/h3>\n<h3><strong>user &amp; kernel MBR OK<\/strong><\/h3>\n<h2><strong>If your MBR is infected with MBR Bootkit TDL3 variant of Alureon,  one of the disk drive controllers will be hooked and show up as &#8220;UNKNOWN&#8221; in  the<em> called module listing<\/em>.\u00a0 In this instance, the hooked driver is  needs to be identified by running a more in depth Anti-Rootkit Program (such as  <a href=\"http:\/\/www.gmer.net\/\">Gmer Anti-Rootkit<\/a>, or<a href=\"http:\/\/www.rootkit.com\/vault\/DiabloNova\/RKUnhookerLE.EXE\"> Rootkit  Unhooker<\/a> with &#8220;Code Sections&#8221; or &#8220;Code Hooks&#8221; scanning  enabled.<\/strong><\/h2>\n<p>________________________________<\/p>\n<h2><strong><strong>TDL3 infection is detected by running mbr.exe with the -s  switch (to disassemble code for unknown hookers):<\/strong><\/strong><\/h2>\n<h3>Stealth MBR rootkit\/Mebroot\/Sinowal\/TDL4 detector 0.4.1 by Gmer, <a href=\"http:\/\/www.gmer.net\/\" target=\"_blank\">http:\/\/www.gmer.net<\/a><br \/>\nWindows  5.1.2600 Disk: HTS726060M9AT00 rev.MH4OA6EA -&gt;  \\Device\\Ide\\IdePort0<\/p>\n<p>device: opened successfully<br \/>\nuser: MBR read  successfully<br \/>\ncalled modules: ntoskrnl.exe CLASSPNP.SYS disk.sys<strong> &gt;&gt;UNKNOWN [0x86A9DEC5]&lt;&lt; <\/strong><br \/>\n_asm { PUSH EBP; MOV EBP,  ESP; SUB ESP, 0x1c; PUSH EBX; PUSH ESI; MOV DWORD [EBP-0x4], 0x86344872; SUB  DWORD [EBP-0x4], 0x8634412e; PUSH EDI; CALL 0xffffffffffffdf33; }<br \/>\n1  nt!IofCallDriver[0x804E37D5] -&gt; \\Device\\Harddisk0\\DR0[0x87785AB8]<br \/>\n3  CLASSPNP[0xF786EFD7] -&gt; nt!IofCallDriver[0x804E37D5] -&gt;  [0x87506930]<br \/>\n[0x86974CA8] -&gt; IRP_MJ_CREATE -&gt; 0x86A9DEC5<br \/>\nkernel: MBR  read successfully<br \/>\n_asm { CLI ; MOV AX, 0x0; MOV SS, AX; MOV SP, 0x7c00; STI ;  MOV DS, AX; CLD ; MOV CX, 0x80; MOV SI, SP; MOV DI, 0x600; MOV ES, AX; REP MOVSD  ; JMP FAR 0x0:0x62f; }<br \/>\ndetected hooks:<br \/>\n\\Device\\Ide\\IdeDeviceP0T0L0-3 -&gt;  \\??\\IDE#DiskHTS726060M9AT00_________________________MH4OA6EA#5&amp;17ce0675&amp;0&amp;0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}  device not found<br \/>\n\\Driver\\atapi DriverStartIo -&gt; 0x86A9DAEA<br \/>\nuser &amp;  kernel MBR OK<br \/>\nsectors 117210238 (+255): user != kernel<br \/>\n<strong>Warning:  possible TDL3 rootkit infection !<\/strong> &lt;=====<\/p>\n<p>Filesystem  trace:<br \/>\ncalled modules: ntoskrnl.exe hal.dll fltmgr.sys Ntfs.sys<br \/>\n1  nt!IofCallDriver[0x804E37D5] -&gt; [0x8772C250]<br \/>\n3 fltmgr[0xF77435C8] -&gt;  nt!IofCallDriver[0x804E37D5] -&gt; [0x8778F020]<br \/>\n5 nt[0x80567F6C] -&gt;  nt!IofCallDriver[0x804E37D5] -&gt; [0x8772C250]<br \/>\n7 fltmgr[0xF7736FB5] -&gt;  nt!IofCallDriver[0x804E37D5] -&gt; [0x8778F020]<\/p>\n<p>Registry trace:<br \/>\ncalled  modules: ntoskrnl.exe hal.dll<br \/>\n______________________________<\/h3>\n<h2><strong>TDL4 infected MBR is exposed by running mbr.exe with the -s  switch:<\/strong><\/h2>\n<h2>C:\\&gt;&#8221;%userprofile%\\desktop\\mbr.exe&#8221; -s<\/h2>\n<h3><strong>Stealth MBR rootkit\/Mebroot\/Sinowal\/TDL4 detector 0.4.1 by Gmer, <a title=\"External link\" href=\"http:\/\/www.gmer.net\/\">http:\/\/www.gmer.net<\/a><br \/>\nWindows 5.1.2600 Disk:  ST360015A rev.3.33 -&gt; \\Device\\Ide\\IdePort0<\/strong><\/h3>\n<h3>device: opened successfully<\/h3>\n<h3><strong>user: MBR read successfully<\/strong><\/h3>\n<h3><strong>called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys &gt;&gt;UNKNOWN  [0x83B49446]&lt;&lt;<\/strong><\/h3>\n<h3><strong>_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP  EAX, [0x83b4f504]; MOV EAX, [0x83b4f580]; PUSH EBX; PUSH ESI; MOV ESI,  [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX;  }<\/strong><\/h3>\n<h3><strong>1 nt!IofCallDriver[0x804E37D5] -&gt;  \\Device\\Harddisk0\\DR0[0x83B62AB8]<\/strong><\/h3>\n<h3><strong>3 CLASSPNP[0xF756FFD7] -&gt; nt!IofCallDriver[0x804E37D5] -&gt;  [0x83B3F300]<\/strong><\/h3>\n<h3><strong>\\Driver\\atapi[0x83B7AD10] -&gt; IRP_MJ_CREATE -&gt;  0x83B49446<\/strong><\/h3>\n<h3><strong>kernel: MBR read successfully<\/strong><\/h3>\n<h3><strong>detected hooks:<\/strong><\/h3>\n<h3><strong>\\Device\\Ide\\IdeDeviceP0T0L0-3 -&gt;  \\??\\IDE#DiskST360015A_______________________________3.33____#4b333143394a4241202020202020202020202020#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}  device not found<\/strong><\/h3>\n<h3><strong>\\Driver\\atapi DriverStartIo -&gt; 0x83B49292<\/strong><\/h3>\n<h3><strong>user != kernel MBR !!!\u00a0\u00a0 &lt;====<br \/>\n<\/strong><\/h3>\n<h3><strong>sectors 117231406 (+230): user != kernel<\/strong><\/h3>\n<h3><strong>Warning: possible TDL4 rootkit infection !\u00a0\u00a0  &lt;====<br \/>\n<\/strong><\/h3>\n<h3><strong>TDL4 rootkit infection detected ! Use: &#8220;mbr.exe -f&#8221; to  fix.<\/strong><\/h3>\n<h3>============================================<\/h3>\n<h2><strong>To have mbr.exe fix a TDL4 infected MBR issue the following  command:<\/strong><\/h2>\n<h2><em>%userprofile%\\desktop\\mbr.exe -f<\/em><\/h2>\n<h2><strong>To have mbr.exe backup your MBR,<\/strong><\/h2>\n<h2><strong>Issue this command at the Comand Prompt:<\/strong><\/h2>\n<h2><em><strong>%userprofile%\\desktop\\mbr.exe -c 0 1  mbr-backup.dat<\/strong><\/em><\/h2>\n<h2><strong>And a <strong>copy of the MBR<\/strong> will be placed in the file: <\/strong><strong><strong>mbr-backup.dat<\/strong><\/strong> on your  <strong>Desktop.<\/strong><\/h2>\n<h2><strong>4. <a href=\"http:\/\/www.misec.net\/products\/mbr-backup\/\">MBR  Backup<\/a> by Mischel Internet Security <\/strong><\/h2>\n<h2>To Back up the MBR select:<strong> &#8220;Save MBR&#8230;.&#8221; <\/strong><\/h2>\n<h2>The MBR is saved to a BIN file with this format:<\/h2>\n<h3><strong>MBR_&lt;yyyy-month-day&gt;.bin<\/strong><\/h3>\n<h2>To Restore the MBR select: <strong>&#8220;Restore MBR&#8230;.&#8221; <\/strong><\/h2>\n<h2>To Print the MBR select: &#8220;Print MBR&#8221;<\/h2>\n<h3><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/secure-computer-solutions.com\/blog\/MBRBackupPic.jpg\" border=\"0\" alt=\"MBRBackupPic.jpg\" width=\"524\" height=\"510\" \/><\/h3>\n<h1>Detecting and removing the MBR rootkit infection<\/h1>\n<h2>(including repairing the MBR)<\/h2>\n<h2><strong>If you are infected or are experiencing the symptoms of TDSS  (Alureon, TDSS, TDL3, TDL4) infection,\u00a0 then <\/strong><strong><a href=\"http:\/\/support.kaspersky.com\/viruses\/solutions?qid=208280684\">TDSSKiller<\/a> by Kaspersky Labs can:<\/strong><\/h2>\n<blockquote>\n<h2>1. Scan your system for TDSS infection<\/h2>\n<h2>2. Clean the infection<\/h2>\n<h2>3. Replace the infected MBR with a clean default Windows copy<\/h2>\n<h2>4. Produce a Scan Report<\/h2>\n<\/blockquote>\n<h2><strong><a href=\"http:\/\/support.kaspersky.com\/viruses\/solutions?qid=208280684\">TDSSKiller<\/a> <\/strong>Specifically targets (Detects and Cleans) ALL variants of the Alureon  bootkit trojan (TDSS ) on 32 bit and 64 bit Windows Systems<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/secure-computer-solutions.com\/blog\/TDSKillerStart.jpg\" border=\"0\" alt=\"TDSKillerStart.jpg\" width=\"537\" height=\"342\" \/><\/p>\n<h1>If You are infected with the Alureon Bootkit:<\/h1>\n<h1>Here are my recommendations:<\/h1>\n<ol>\n<li>\n<h2>Scan with <a href=\"http:\/\/support.kaspersky.com\/viruses\/solutions?qid=208280684\"><strong>TDSSKiller<\/strong><\/a> and Cure or Remove Malicious objects as advised by TDSSKiller&#8217;s <span style=\"text-decoration: underline;\">default<\/span> action.<\/h2>\n<\/li>\n<li>\n<h2>If TDSSKiller says you&#8217;re infected with TDL4 &#8211; You will see this in your  TDSSKiller Log:<\/h2>\n<h3><strong>2010\/11\/06 16:11:04.0265 Detected object count: 1<\/strong><\/h3>\n<h3><strong>2010\/11\/06 16:11:23.0281 \\HardDisk0 &#8211; will be cured after  reboot<\/strong><\/h3>\n<h3><strong>2010\/11\/06 16:11:23.0281 Rootkit.Win32.TDSS.tdl4(\\HardDisk0) &#8211; User  select action: Cure<\/strong><\/h3>\n<h2>If you have TDL4, AND You have a clean, <span style=\"text-decoration: underline;\">pre-infection<\/span> MBR  Backup:<\/h2>\n<ul>\n<li>\n<h2>Backup the default Windows MBR that TDSSKiller overwrote the infected one  with (this is a safety measure).<\/h2>\n<\/li>\n<li>\n<h2>Then, replace the Windows default MBR that TDSSKiller installed with your  <span style=\"text-decoration: underline;\"><strong>origina<\/strong>l<\/span> MBR (uninfected) Backup<\/h2>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<h2>Scan with the <a href=\"http:\/\/secure-computer-solutions.com\/blog\/2010\/09\/scanning_and_removing_malware.html\">Malicious  Software Removal Tool<\/a><\/h2>\n<\/li>\n<li>\n<h2>Scan with <a href=\"http:\/\/www.malwarebytes.org\/mbam.php\">Malwarebytes&#8217;  Antimalware<\/a><\/h2>\n<\/li>\n<li>\n<h2>Perform a<strong> complete system scan<\/strong> with one of the following  <strong>online scanners using Internet Explorer<\/strong> as your  browser:<\/h2>\n<\/li>\n<\/ol>\n<blockquote>\n<ul>\n<li>\n<h2><a href=\"http:\/\/www.eset.com\/online-scanner\">ESET Online  Scanner<br \/>\n<\/a><\/h2>\n<\/li>\n<li>\n<h2><a href=\"http:\/\/www.kaspersky.com\/virusscanner\">Kaspersky Online  Scanner<br \/>\n<\/a><\/h2>\n<\/li>\n<li>\n<h2><a href=\"http:\/\/onecare.live.com\/site\/en-us\/default.htm\">Windows Live Safety  Scanner <\/a><\/h2>\n<\/li>\n<\/ul>\n<\/blockquote>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Alureon Bootkit Trojan &#8211; Crossing the 64 bit Barrier There is a very prevalent rootkit (hidden malicious program) that has been infecting Windows computers for quite some time now. The general name the Microsoft Malware Protection Center has assigned to &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?p=582\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-582","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=582"}],"version-history":[{"count":1,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/582\/revisions"}],"predecessor-version":[{"id":583,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/582\/revisions\/583"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=582"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}