Rootkit works on X64 !

Discussion in 'malware problems & news' started by CloneRanger, Aug 21, 2010.

Thread Status:
Not open for further replies.
  1. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    Hello,

    Rather easily, check out cloneranger's link in the first post to keep up with new tdl3.
    Btw x64,
    atm
    Hitman Pro detects, kudos erik:thumb:
    tdsskiller does not
    SAS does not
     
  2. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    No person I know has ever said 64 bit OS's were unbreakable. This rootkit is a bypass of PatchGuard and PatchGuard has very little to do with a 64 bit OS (for some unknown reason, M$ only decided to apply PatchGuard in 64 bit versions of their OS).

    Wrong. Some things can be proven, mathematically, to be unbreakable. The most salient example is probably the One Time Pad, aka Vernam cipher. The unbreakable strength of a OTP was proven by the greatest information theorist of the 20th century, Claude Shannon (who also gave us digital communication), and also proved by the Soviets at about the same time.

    And other things, while not provably unbreakable, probably are practically unbreakable (things like TripleDES or AES and other modern block ciphers).
     
  3. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
  4. ParadigmShift

    ParadigmShift Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    241
    Windows 7 (x64) Test Box w/latest TDL3 MBR dropper

    1. Hitman Pro 3.5.6 build 112 BETA - MBR repair worked well. (Thank you)
    2. Latest Kaspersky TDSSKiller - MBR repair worked well. (Thank you as well)
     
  5. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Alureon Evolves to 64 Bit:
     
  6. Boyfriend

    Boyfriend Registered Member

    Joined:
    Jun 7, 2010
    Posts:
    1,070
    Location:
    Pakistan
    TDSSKiller should now work on x64. They have last updated their utility on Aug 27.

     
  7. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    TDSSKiller runs on 64-bit, but it doesn't remove the 64-bit TDL3 rootkit, yet.
     
  8. Boyfriend

    Boyfriend Registered Member

    Joined:
    Jun 7, 2010
    Posts:
    1,070
    Location:
    Pakistan
    Thanks erikloman for clarification. Therefore, only Hitman Pro supports removal of TDL3 64-Bit rootkit. Keep up good work :thumb: :)
     
  9. Rampastein

    Rampastein Registered Member

    Joined:
    Oct 16, 2009
    Posts:
    290
    Do any AVs currently detect this while it's active?
     
  10. Konata Izumi

    Konata Izumi Registered Member

    Joined:
    Nov 23, 2008
    Posts:
    1,557
    UAC/LUA/SRP FTW!! :D

    Its so basic... :)
    someone should just improve the user-friendliness/convenience on running under these environment...
     
  11. ParadigmShift

    ParadigmShift Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    241
    My testing was on 32-bit Win 7. The x64 workable tool is forthcoming.
     
  12. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    We have done a series of YouTube video's a few months ago to see which AV was able to detect a TDL3 infection. We first infected the computer (to simulate a missed dropper) and then installed the AV to see whether it was able to detect the TDL3 rootkit infection.

    You can see the video's here

    They are all on our channel here.

    Spoiler alert: All AVs fail to even detect the infection (only 1 or 2 were able to detect but failed to remove). AV's are oriented towards protecting the computer (blocking droppers). But since droppers are changing rapidly, AV's frequently fail to detect zero-day droppers as you can see from these statistics where MSRT cleaned over 1.2 million computers! (Note: Microsoft started noticing the scale of TDL3 after it interfered with a security update).

    From Hitman Pro cloud statistics we see that 31% of daily infections are currently TDL3. 67% of those infected computers are running an up-to-date AV (Windows Security Center reported a healthy installed AV during scan).

    Most vendors have a malware top 20. And most top 20's aren't listing either Alureon, TDSS, Olmarik or Tidserv (aliases for TDL3). If Microsoft can detect and clean 1.2 million computers, how can TDL3 be not in the top 20?

    The absence of TDL3 in the top 20's is a clear sign that most AV's are not detecting TDL3 rootkit on infected computers (AV's do detect most TDL3 droppers; zero-day is a problem). The video's we did underline that: rootkits are a problem for AV's.

    OT: What is with the YouTube links not being properly parsed?
     
    Last edited: Aug 31, 2010
  13. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Good morning from California, erikloman,

    Do you have any idea how many of the infections come from remote code execution exploits, versus manually installing something that happens to be infected?

    thanks,

    rich
     
  14. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    I wish we had that kind of detailed information but Hitman Pro is on-demand only so we don't see how it got on the system.

    From what I can tell is that TDL3 is pushed by all means: spam, PDF/Java exploits, drive-by-downloads, fake websites (looking like an AV), downloads cracks/keygens on websites, torrents, newsgroups, etc.

    Once you have TDL3 it reels in additional malware (usually rogues/fake AV). TDL3 authors get their money from stuff that gets installed.

    The additional malware is usually detected by an installed AV but the TDL3 rootkit remains. So the AV keeps warning users on a regular basis.

    Users then start looking for a solution and end up using software like TDSSKiller or Hitman Pro. Where TDSSKiller (or any other TDL3 specific tool) only kills TDL3. Hitman Pro kills TDL3 and all the additional malware it finds.
     
    Last edited: Aug 31, 2010
  15. Rampastein

    Rampastein Registered Member

    Joined:
    Oct 16, 2009
    Posts:
    290
    Thanks for those, good to know. Some products might have improved since the making of those videos though, but they still show that only a few AVs can detect TDL3.
     
    Last edited: Sep 1, 2010
  16. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Thanks!

    ----
    rich
     
  17. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Amazing :eek:

    Exactly !

    Sure are, even though a few years back quite a number of people said they never would be :p

    It prevents click through payments from here to there ;)
     
  18. ESS3

    ESS3 Registered Member

    Joined:
    Dec 11, 2007
    Posts:
    112

    Attached Files:

  19. wearetheborg

    wearetheborg Registered Member

    Joined:
    Nov 14, 2009
    Posts:
    667
    erikloman, thanks for the stats!

    Isnt there a way for TDS3 or other malware to be such that it is not detectable by any anti-malware software? When it gets installed, it has root privileges.., so it can do whatever it wants...
     
  20. stackz

    stackz Registered Member

    Joined:
    Dec 27, 2007
    Posts:
    646
    Location:
    Sydney Australia
    Detection for the presence of all TDL3 versions, has always been trivial via user mode memory scanning - the same method works for them all.
     
  21. rager

    rager Registered Member

    Joined:
    Sep 15, 2010
    Posts:
    5
    So there are rootkits that work on x64...but doesnt that still imply that using an x64 OS still makes you considerably less likely to get infected by a rootkit?

    There arent many out there that work on x64 right? so in practical terms most users are quite safe? or am I wrong
     
  22. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
  23. katio

    katio Guest

    So how does it bypass patchguard? Does it rely on a bug or is it a problem with the design and implementation of patchguard itself?
    Given that according to wikipedia "Microsoft has stated that they are committed to remove any flaws that allow KPP to be bypassed as part of its standard Security Response Center process" I'd expect a security fix like last patch Tuesday. Any CVE I could track?
    Thank you.
     
  24. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
  25. EraserHW

    EraserHW Malware Expert

    Joined:
    Oct 19, 2005
    Posts:
    588
    Location:
    Italy
    Quoting Wikipedia:

    TDL3/4 rootkit bypasses Patchguard by design, because it doesn't patch Windows kernel in any way. It does patch miniport driver
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.