Ransomware lands on the MBR

Discussion in 'malware problems & news' started by Triple Helix, Dec 10, 2010.

Thread Status:
Not open for further replies.
  1. Rilla927

    Rilla927 Registered Member

    Joined:
    May 12, 2005
    Posts:
    1,742
    I would like to know too.
     
  2. treehouse786

    treehouse786 Registered Member

    Joined:
    Jun 6, 2010
    Posts:
    1,411
    Location:
    Lancashire
    well i ran a simple overwrite but it still never removed it lol, dont know if i picked the wrong setting or summat (first time darek user)
     
  3. Rilla927

    Rilla927 Registered Member

    Joined:
    May 12, 2005
    Posts:
    1,742
    Maybe someone else that uses it can tell us.
     
  4. TheKid7

    TheKid7 Registered Member

    Joined:
    Jul 22, 2006
    Posts:
    3,576
    How about the following?:

    1. Use MBRtool in the Ultimate Boot CD. I have used MBRtool when trying some versions of Linux which for security had locked the MBR. I used MBRtool and deleted the MBR so that I could install a different version of Linux. Deleting the MBR is much faster than the following options.

    http://www.ultimatebootcd.com/

    2. Use your hard drive manufacturer's bootable diagnostics CD and write zeros to all sectors of the hard drive. This should eliminate all malware on the hard drive. Writing zeros to all sectors of the hard drive will take from a few hours to as much as a day depending on your hard drive size.

    3. Use one of the following free bootable CD's to write zeros to all sectors of the hard drive:

    CopyWipe (DOS GUI):

    http://www.terabyteunlimited.com/copywipe.php

    Partition Wizard (Linux GUI):

    http://www.partitionwizard.com/partition-wizard-bootable-cd.html
     
  5. treehouse786

    treehouse786 Registered Member

    Joined:
    Jun 6, 2010
    Posts:
    1,411
    Location:
    Lancashire
    tried that but it did not remove this malware
     
  6. safeguy

    safeguy Registered Member

    Joined:
    Jun 14, 2010
    Posts:
    1,797
    A few questions:

    1. Does SpyShelter HIPS component help in preventing this? If someone is willing to test (and provide screen-shot if possible), I'd appreciate it.

    2. Assuming one is already infected, what's the easiest way for an average folk to clean up this mess?
     
  7. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    SS free:

    If you are infected with this sample then apparently a FIXMBR command should put things right.

    SS.JPG
     
  8. safeguy

    safeguy Registered Member

    Joined:
    Jun 14, 2010
    Posts:
    1,797
    OK thanks Franklin:)
     
  9. Boyfriend

    Boyfriend Registered Member

    Joined:
    Jun 7, 2010
    Posts:
    1,070
    Location:
    Pakistan
    Yesterday, I tested many zero-day MBR Ransomwares, Trojans, and root-kits against SS Free as well as against competitor product. SS system protection is very strong (30 hooks on my XP SP3 test system). It was able to block suspicious executions/actions and test system remained under full control, although few threats were still able to drop their drivers under windows and system32 folder but those payloads were not active and easy to clean via Hitman Pro and MBAM. The major thing here is I was at least able to log in in each case with SS, but competitor product failed at this step.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.