what is the best rootkit prevention/protection?

Discussion in 'other anti-malware software' started by jmonge, Jan 25, 2010.

Thread Status:
Not open for further replies.
  1. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,275
    Location:
    Ontario, Canada
    Save them there great!!

    TH
     
  2. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    sure:D this one remind me of high school lol:D ;)
     
  3. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Unfortunately, all of these analyses of this BackDoor.Tdss.565 exploit show what happens after the trojan file is executed. Thus, your quote earlier from the PDF file,

    comes later in the article, where the opening statement is,

    So, the assumption is, the malware file has executed, and now it's analyzed.

    The analysis is very interesting (also very complicated -- I can't follow most of it). You wrote earlier,

    For a better understanding, you need to read basic analysis of malware behavior, code injection, rootkit behavior, etc. Once you get all of that, you can explain it to me!

    From one point of view in this thread, these analyses of the malware behavior are irrelevant to 'Prevention at the Gate', so to speak: How can the malware be prevented from being delivered?

    Nowhere is it discussed in these analyses how BackDoor.Tdss.565 is delivered to the computer and attempts to execute in the first place.

    In all of the Hijack Forums, no one ever says how the infection took place: what was the delivery method to the computer? Has anyone heard or read details about how one has gotten this trojan in the first place?

    BackDoor.Tdss.565 is a trojan:

    http://www.precisesecurity.com/trojan/backdoortdss565/
    Trojan used in this sense is an executable file. Thus, the suggestions for HIPS and anti-execution types of programs by many here, to effectively block the initial executable from running and doing any damage if the delivery method is by remote code execution.

    BackDoor.Tdss.565
    http://vms.drweb.com/virus/?i=441481
    So, it needs to install first. From this standpoint, a rootkit trojan is no different from any other trojan, in terms of Prevention. A rootkit, by definition, hides. Sure, that's scary, but, to paraphrase fcukdat, if it can't execute/install, it can't hide.

    However, if the infection occurs via a download that the user authorizes, as indicated in remarks regarding one of the Tdss aliases:

    Infected With Packed.Win32.Tdss.f?
    http://www.spytrackers.com/threats/packed-win32-tdss-f-removal.html
    In this case, HIPS and anti-execution protection are disabled to permit the installation. So, different preventative measures must be taken, beginning with how the user decides what is safe to download/install.

    This thread has two topics going on at once: Prevention from executing in the first place, and Monitoring/Detecting/Blocking the rootkit behavior (behaviour blockers,), should the file execute, in the second place.

    These two topics should be in separate threads, in my view, for the lines between them get blurred and can cause confusion.

    ----
    rich
     
  4. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    You have made a very good point here..." If it can't execute/install, it can't hide himself"...

    IMHO, if you would like to prevent any trojan or rootkit, then you should use your little common sense first, before jumping on any conclusion...

    At first, you should have updated OS with a good Anti-Virus, Anti-Malware and good firewall and all these should be updated. Secondly, you should you use Sandboxie for your daily browsing activities. You should always use LUA with having SRP or AppLocker policies implemented.

    Never install any software/codec which is downloaded from dodgy site. If you want to test it, test on Virtual Machine which is again should be protected by a good AV, Anti-Malware, HIPS and Any Virtualisation software like "Returnil" or "Shadow Defender"....This will make you atleast 99.9% safe....

    I always use this type of trend to protect my computer system....
     
  5. Windchild

    Windchild Registered Member

    Joined:
    Jun 16, 2009
    Posts:
    571
    From the links given in this thread, it seems to be just another rootkit malware with nothing particularly scary or special about it. The dropper requires admin privileges to infect the system - the usual SeLoadDriverPrivilege to be more precise, and admin privileges are needed to be able to inject anything into the print spooler process that's running as SYSTEM. So basically, just another day at the office. Simply not running the malware dropper as admin would prevent infection, so, yeah, LUA would stop it.
     
  6. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    so if print spooler process is disable this malware is useless then:D
     
  7. kmr1685

    kmr1685 Registered Member

    Joined:
    Aug 22, 2009
    Posts:
    62
    hey mr.TH :argh: i really like the second picture, i trust you are dealing with your virus (especially: rootkits) like this;) :cool: . i really like your way dude.keep it up soon i will join you.:D
    ps: there is any welcome party to join in your band wagon.:argh: (off topic i know).
     
  8. Chamlin

    Chamlin Registered Member

    Joined:
    Aug 8, 2006
    Posts:
    449
    So much here over my head. Will by Online Armor Premium and NOD 32 v4 take care of this?
     
  9. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    the hips componet of online armor will stop this type of malware;) if you know hot to click:) when it comes to decide allow/denny:cool:
     
  10. Chamlin

    Chamlin Registered Member

    Joined:
    Aug 8, 2006
    Posts:
    449
    Yes, that question haunts me constantly. I'm always looking up .dll's, etc. online to see what the heck they are. And, at times, in not recognizing the program (usually some windows file), I get stuck in fear that:
    1. If I don't "allow" my PC might not work right;
    2. If I do allow, my life could get very complicated.

    Any suggestions? (It's even worse for my wife in this way!)

    Peace,
    Chamlin
     
  11. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    online armor scaner also detects rootkits in real time;) you should be ok if you always becarefull of what you download in to your pc;) ,i use prevx for rootkits removal and DefenseWall for rootkits prevention:thumb:
     
  12. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,275
    Location:
    Ontario, Canada
    The wagon is never full! And if a club is all you need then use it! :D

    TH
     
  13. jdd58

    jdd58 Registered Member

    Joined:
    Jan 30, 2008
    Posts:
    556
    Location:
    Sonoran Desert
    OK, so business as usual. I thought it was something new.

    Thanks
     
  14. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    Hi, has anyone seen or used this new(?) rootkit scanner PScanner++ 1.9.0.2 ?
    Unfortunately the website www.pscanner.com is only in Italian yet, but some info and d/l is also at Softpedia.
    I installed it (Windows 7 x32), and it seemed good, but I don't know enough to use it properly. Just thought it could be of interest?
     
  15. dcrowe0050

    dcrowe0050 Registered Member

    Joined:
    Sep 1, 2009
    Posts:
    378
    Location:
    NC
    Whatever happened to Hypersight Rootkit Detector. I remember a thread on wilders last year about it but have heard nothing since. Guess it wasnt too good.
     
  16. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    Yes, also NT Internals has it listed. 1 2 more antimalware.

    Last blog post was June 23rd, 2008.
     
  17. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    which scaner will be the fastest and strongest againts rootkits?any coments?thanks
     
  18. progress

    progress Guest

    There is no strongest scanner :oops: Sometimes GMER, sometimes RootRepeal, sometimes MBAM, sometimes A² ...
     
  19. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    yeah:) i guez prevx will do good job at saving some bacon too;)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.