rootkit ~.exe

Done:

File _.exe received on 12.18.2008 21:01:06 (CET)Antivirus Version Last Update Result
AhnLab-V3 2008.12.19.0 2008.12.18 -
AntiVir 7.9.0.45 2008.12.18 -
Authentium 5.1.0.4 2008.12.18 -
Avast 4.8.1281.0 2008.12.18 -
AVG 8.0.0.199 2008.12.18 Dropper.Generic.TJU
BitDefender 7.2 2008.12.18 -
CAT-QuickHeal 10.00 2008.12.18 (Suspicious) - DNAScan
ClamAV 0.94.1 2008.12.18 Trojan.Agent-12124
Comodo 771 2008.12.17 -
DrWeb 4.44.0.09170 2008.12.18 Trojan.Cipher.117
eSafe 7.0.17.0 2008.12.18 Suspicious File
eTrust-Vet 31.6.6267 2008.12.18 -
Ewido 4.0 2008.12.18 -
F-Prot 4.4.4.56 2008.12.18 -
F-Secure 8.0.14332.0 2008.12.18 Suspicious:W32/Malware!Gemini
Fortinet 3.117.0.0 2008.12.18 -
GData 19 2008.12.18 -
Ikarus T3.1.1.45.0 2008.12.18 Trojan-Dropper.Win32.Ilomo.A
K7AntiVirus 7.10.557 2008.12.18 -
Kaspersky 7.0.0.125 2008.12.18 -
McAfee 5468 2008.12.18 -
McAfee+Artemis 5468 2008.12.18 -
Microsoft 1.4205 2008.12.18 TrojanDropper:Win32/Ilomo.gen!A
NOD32 3703 2008.12.18 -
Norman 5.80.02 2008.12.18 W32/Smalltroj.CEJU
Panda 9.0.0.4 2008.12.18 Suspicious file
PCTools 4.4.2.0 2008.12.18 -
Prevx1 V2 2008.12.18 Malicious Software
Rising 21.08.32.00 2008.12.18 -
SecureWeb-Gateway 6.7.6 2008.12.18 Win32.Malware.dam (suspicious)
Sophos 4.37.0 2008.12.18 -
Sunbelt 3.2.1801.2 2008.12.11 -
Symantec 10 2008.12.18 -
TheHacker 6.3.1.4.191 2008.12.17 -
TrendMicro 8.700.0.1004 2008.12.18 -
VBA32 3.12.8.10 2008.12.18 Trojan.Win32.Agent.cyt
ViRobot 2008.12.18.1525 2008.12.18 -
VirusBuster 4.5.11.0 2008.12.18 -

Additional information
File size: 209387 bytes
MD5…: 95f98c70a2d6028df43c6128f87c755e
SHA1…: c631199796708b53fe9142235225d71714196751
SHA256: 69e68a6b952f760d35e906f398e4c41a3bf8239c22376d5ea428fa0eec3a5b6c
SHA512: c073678d7e6cec44685985d5f93049a07dfdbf661bf626bfbace41741d664cc5
46b7cfcdfcfa5bbc6cf82d2913faf976cc398728070f93bf9f47d92706426650

ssdeep: 6144:MkGvEwb7d44dyEDIgkMw5sZn2DHI3wcq+hKl:MkGvN7m4dyEUb+ZnII3kM8

PEiD…: -
TrID…: File type identification
Win32 EXE Yoda’s Crypter (54.5%)
Win32 Executable Generic (17.5%)
Win32 Dynamic Link Library (generic) (15.5%)
Clipper DOS Executable (4.1%)
Generic Win/DOS Executable (4.1%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x41c790
timedatestamp…: 0x0 (Thu Jan 01 00:00:00 1970)
machinetype…: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
CODE 0x1000 0xc000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
DATA 0xd000 0x10000 0xfa00 7.94 4ff6e4d44fd1186477b257b3aca7e2f0
.rsrc 0x1d000 0x1000 0x200 1.62 f7ff138b6380cc5e08994ef6d2816dec
.rsrc 0x1e000 0x3d0 0x400 0.00 d41d8cd98f00b204e9800998ecf8427e

( 2 imports )
> KERNEL32.DLL: LoadLibraryA, GetProcAddress, ExitProcess
> ADVAPI32.dll: RegOpenKeyA

( 0 exports )

Prevx info: <a href=‘http://info.prevx.com/aboutprogramtext.asp?PX5=4A0D0261EBE3C4A531590339553FD1007D8F3831’ target=‘_blank’>http://info.prevx.com/aboutprogramtext.asp?PX5=4A0D0261EBE3C4A531590339553FD1007D8F3831&lt;/a&gt;
packers (Kaspersky): PE_Patch.UPX, UPX, PE_Patch
packers (F-Prot): UPX

It was part of a background trojan I suggest you immediately run MBAM or SAS with quick scan first and then full scan. No one mentioned a false positive.

Ok thanks.

I am not aware of these two programs you mentioned. I have Ad-Aware and Windows Defender. Will they do?

MBAM = malware bytes pro?
SAS = ???

Personally I feel AdAware is no longer what it was, it is now more a waste of HDD space when compared to MBAM or SAS and the only thing going for windows defender is that is has resident protection, which neither SAS or MBAM have in the free version.

I think you will see that the first time you run SAS and MBAM.

MBAM = MalwareBytes AntiMalware = MBAM free
MBAM Pro = MBAM Pro

I completely agree with David. I removed Ad-Aware a long time ago.

Follow-up:
I had my client run MBAM again a few minutes and the computer is still clean.

Another vote against ad-aware…

SUPERantispyware
MBAM.
Other will be Spyware Terminator.

Thanks guys. I’ve been hearing the same about Ad-Aware a lot recently. It’s unforunate.

Thanks for the links. :wink:

Now… I have to wonder HOW I got this ~.exe on my computer. I scan all files with Avast! before running their installs, and I don’t normally download anything that isn’t popular. I’ve recently installed DVD burning software, but AFAIK it’s popular software, and I downloaded them from the official sites.

I am wondering if someone actually got into my computer from this… grrr. >:(

Most likely, you visited a site which itself was infected - even legitinate ones. Or you received a popup indicating that you needed a malware program and you terminated it by clicking ‘close etc’ or even the ‘red x’.

In my client’s case, it was one of the above or from a P2P site (in their case free lyrics).

Installation of programs is far the least likely method of getting infected.

When I get browser pop-ups, I can tell if the buttons are real or fake, so it wasn’t that.

I DID just go to some free song lyrics websites, and they always have tons of crap on their pages. Also, I have been to torrent search websites recently. So, that sounds like the most likely cause.

I am in disbelief… a browser exploit allowing a backdoor to be installed? I wonder what the point of this backdoor was. I wonder if it’s just some script kiddie messing around. I also wonder why Windows Firewall doesn’t at least notify me and ask me if connections to/from this backdoor are legit, because I certainly would not have allowed them. Perhaps it never ran. The file date was Dec 2007, so it could have been on my system for a year, or perhaps the file date is meaningless.

Firewalls do not protect against compromised web sites. I have never heard of Windows Defender doing anything against rogue exploits. I would not trust the date of the file.

As sunrisecc mentions,a firewall isn’t effective against this type of exploit as a firewall is expecting traffic back because you initiated the outbound connection, yes they would block unauthorised inbound connections if you didn’t initiate the connection.

A backdoor, is almost self explanatory to allow ‘stuff’ (sorry about getting technical) into your system bypassing your security.

The windows firewall is about as much use as a chocolate fire-guard as the XP one provides zero outbound protection and the Vista one has it disabled by default. Even when the Vista firewall outbound protection is enabled it is rule based and the user has to create the rules, so not very user friendly.

So are you using XP or Vista firewall ?

Thank for all the help guys. It is much appreciated! :slight_smile:

I am running Windows XP SP3. Ok, I understand the Firewall concept. I could install a Firewall that asked for EVERY connection, which is totally user-UNfriendly, but it would have stopped this backdoor from working unless I was stupid enough to allow it.

It appears ~.exe is actually a dropper… which is a backdoor, I guess, since it allows the downloading and installing of whatever it wants.

I am thinking that it is unlikely a personal actually went sniffing through my files since I didn’t notice any activity, and nothing else on my system was infected with anything virus-like. However, the dropper could have downloaded a perfectly good (i.e. non-virus) program to run and act as a backdoor, so I wouldn’t have noticed anything. Avast! did report some virus in memory but because the pop-up disappear (since I was typing as it came up, and my typing cancelled the dialog box >:( ) I am not sure what it actually was. Avast! no longer reports ~.exe as a problem as you can see from my VirusTotal.com report above.

If I really did get ~.exe from a website, then they knew my IP, as well, which means they could have gotten straight to my computer the moment I got it. >:( But… I am behind a router, which is a hardware firewall! Question: Would my router have blocked the backdoor?

If a website (bonafide) is contaminated, no firewall (hardware or software) will stop it. I could post links to malware-infected websites but do not because of two reasons. Firstly, the owner may have cleaned it up by the time this is read. Secondly, someone may actually click on the link and then it is too late.