othersteve
Member
- Reaction score
- 14
Not sure if this has been mentioned, but I'd give 10:1 odds that a TDSS rootkit is behind it.
I agree that it's most probably a rootkit infection. I've removed a few of these ThinkPoint viruses over the past few days and most have had secondary infections, the most common being a MBR virus. Removing ThinkPoint takes 5 minutes, but you need to be sure that's not the only problem before you sign-off the job.Not sure if this has been mentioned, but I'd give 10:1 odds that a TDSS rootkit is behind it.
I agree that it's most probably a rootkit infection. I've removed a few of these ThinkPoint viruses over the past few days and most have had secondary infections, the most common being a MBR virus. Removing ThinkPoint takes 5 minutes, but you need to be sure that's not the only problem before you sign-off the job.
FWIW TDSS Killer found no trace on any of the systems I've encountered, but Gmer helped to track them down.
QFT, both iptech and Lone99star. Could be a bad system file also however, as once the rootkit is loaded it can be very difficult to detect. Newer versions of TDSSKiller (last week or so) seem to be quite proficient at removing MBR-based TDSS infections, but yeah, if that doesn't work, GMER/mbr.exe are your best friend. If mbr.exe finds an infected or unconventional MBR in use, run mbr.exe -f to correct the issue. Reboot immediately thereafter and run it again to be sure it worked.iptech is exactly right, an MBR infection has been present on the last 4 Think Point infections I have worked on.
After manual removal of the hotfix file and all traces I could find, I still had rootkit activity.
Gmer will find it and if you have the drive imaged I would use Combofix to kill it.
Lone99star
That's odd. I've removed several of them and they didn't have a rootkit.
Co-incidentally I just had a customer call me because they'd screwed up their machine by trying a fix they got off the internet. The fix was to kill and remove the hotfix file.....but no mention of the registry key. Since it replaces the shell value explorer.exe with hotfix.exe he's booting into a blank screen.
LOL, well, theoretically, couldn't he still then press CTRL+SHIFT+ESC to bring up Task Manager (as Winlogon.exe is still running) and then manually run explorer.exe from there the first time until the key is repaired?
EDIT: Also, yeah, TDSS isn't necessarily linked to Thinkpoint, it's just that customers of TDSS can use it to download and install Rogue AVs if they so choose for profit.
Oh yeah, I suppose that is possible. If so, I think the next best option then (without heading out there to fix it yourself) would be to boot to recovery console and simply restore the (previously-infected) registry backup in the system32/config/RegBack folder to the system32/config folder (after backing up the registry hives)... then boot to Safe Mode and remove stuff that's not applicable or malicious via msconfig (assuming he's already removed the offending virus files).This is what I was thinking but he reckons it doesn't work. I know the later editions of it stopped the use of task manager so maybe that setting is still in force?
No; not necessarily. Patched drivers and especially MBR variants of TDSS are very elusive.I ran an offline scanner would that not pick it all up? I will check her log and stuff so i can see how she got reinfected.