VaeVictis:i find it funny that you even consider grammar a sign of intelligence, that itself is a very uneducated claim
The payload: a software nastie called Sirefef. This itself is actually irrelevant; even Microsoft Security Essentials can find and kill most variants. The purpose of Sirefef is to serve as the staging component for the coup de grace: the highly sophisticated Zeroaccess rootkit (Sirefef downloaded some other friends too, but once the rootkit is dealt with, they are easily dispatched.)Zeroaccess is a nightmare. It creates a hidden partition to run components from, deletes the BITS and Windows Update services, infects system restore and then removes the system restore interface from Windows. It locks you out of various sections of your file system it has decided to secrete backup copies of itself into. (C:\Windows\Temp, C:\Windows\System32\Config\Systemprofile and so forth.)Zeroaccess knows all the standard tricks; it hides itself from Trend Micro's virus scanner Housecall, kills industrial-strength bleach Combofix (attempting to run this tool will freeze the system), resists cleaning by SurfRight's Hitman Pro, Symantec's resident AV and so forth. If you delete the hidden partition after booting from a Linux Live CD, chances are you didn't get every last remnant of the thing and it will be back in due time. It also prevents remote support app Teamviewer from starting properly with Windows.If any residue of the rootkit lingers, or if Sirefef and/or its downloaded friends remain, they will all download and reinstall one another and we get to play whack-a-malware one more time. Bonus points were awarded for exploiting known Windows 7 vulnerabilities to infect every other machine on the network; that was a nice touch that really made my Friday.Cleaning up this one Trojan-horse town:So what's the solution? It turns out that some combination therapy kills the Zeroaccess variant in question. The solution I have settled upon is this: - Disconnect every Windows system from the network; if one is infected, they are all infected. (I have absolutely no idea what they used to get through the firewalls on client PCs, but it was effective.) You need to clean all systems one at a time on a quarantine basis. If you have a way to automate the rest of this list for enterprise deployment, please let me know.- Create a new local user with admin privileges, reboot and log on as that user. (You need as clean a profile as possible.)- Download and run Symantec's Zeroaccess removal tool. It will ask you to reboot; do so. A widget will pop up when you next log in that says the rootkit was not found. This is a lie. The removal tool got rid of it, and you have already been reinfected. Fortunately, it can't do anything until the next reboot.- Run Trend Micro's Housecall; kill all the things. Do not reboot. - Repair the background intelligent transfer service (BITS). - Repair the Windows automatic updates service. (If you get the popup for the "Microsoft Fixit" tool, use it. It will fix your broken Windows update service.)- Install Windows updates. Do not reboot. - Run Microsoft Security Essentials; kill all the things. Do not reboot. At this point, you should have killed all of Zeroaccess's little friends. - Re-run the Symantec Zeroaccess removal tool. It should kill the newly reinfected (but still dormant) variant of Zeroaccess.- Reboot. When the system comes back up, make sure you log in as the "new" local administrative account you created. - Run Combofix. If it doesn't lock up your system, you're good!- Reboot back into your regular account, and delete the local account you created for this process. You win.If you are infected with Zeroaccess, exercise extreme caution. Someone is actively versioning this rootkit. I detected at least three different variants on one network alone. More to the point, the little friends that serve as satellite malware are also seeing some rapid evolution; what worked for me today may not work a week from now.
Zeroaccess is a nightmare.
If you still have this problem, don't forget to run whatever malware/ virus scanner in safe mode, after its updated. If you run more then 2 diff types of scanning software, be sure to uninstall others before installin new ones.
Diamondo25• 7 months agoWe recently got an email from "Incoming.Fax@{INSERT YOUR DOMAIN HERE}" with a ZIP that contained this application/virus that used the Adobe Reader icon. Avast didn't detect it directly (only after a Sandbox scan) and after a Jotti scan http: //virusscan. jotti. org/nl/scanresult/d811206e618caacb7fc46c389ab61b400765c8c7 I noticed that only 2 virusscanners identifies it.I also noticed, while looking at the ASM code, that it has some FTP and Mutex imports, which is quite scary.
Mercy is for the weak. Here, in the streets, in competition: A man confronts you, he is the enemy. An enemy deserves no mercy.