I think it was a vundo variant, according to virustotal.com at least, that I
ran across that would delete any file named mbam.exe.

 

 

Phillip Partipilo

Parametric Solutions Inc.

Jupiter, Florida

(561) 747-6107

 

 

From: Mike Gill [mailto:[email protected]] 
Sent: Friday, December 04, 2009 12:25 PM
To: NT System Admin Issues
Subject: RE: New virus trick

 

I'm kind of amazed how ineffective mbam is these days based on a few cases
I've dealt with recently. I have had a couple clients and a couple family
members bring their machines to me and mbam detected things but wasn't able
to clean any of it after repeated attempts. I had to manually remove things
as lately I've been curious as to the reach and tactics of current malware.
The latest one was Windows Enterprise Suite. It installs in the users
%appdata%\local  & %userprofile%\Recent folder. Before that I cleaned a
Vundo variant. I read an article that someone used sysinternal's listdlls to
find it, as it was dll based. The dll's for that have no version number.
Redirecting listdll's output to a test file made it easy to identify the
last three dll's that didn't belong.

 

-- 
Mike Gill

 

From: John Aldrich [mailto:[email protected]] 
Sent: Friday, December 04, 2009 6:39 AM
To: NT System Admin Issues
Subject: New virus trick

 

I was at a seminar yesterday put on by Sunbelt and during a break I had a
chance to talk to one of the presenters and told him of a recent malware
incident I'd cleaned up. He'd never heard of such a trick before so I
thought I'd bring it to y'all's attention so you can be on the lookout for
it. Basically it was the same old malware that's been going around with the
Antivirus Pro sort of stuff, but the twist was that even using Malware Bytes
we were not able to get rid of it. After I was poking around a bit, (I don't
recall why I was looking at the root of C:, but I was) I noticed a batch
file in the root of the C: drive that, when I opened it and looked at it, it
created a bunch of scheduled tasks to re-download the malware/adware. I
wised up and deleted that file, then went into the Scheduled Tasks and
deleted all the malware-created scheduled tasks. Then I was able to
successfully clean the stuff out!

What really got us was that Malware Bytes would clean it, then say it needed
to reboot to finish, and then as soon as we came back, the fake antivirus
was right back there. What I believe it was doing was re-downloading itself
from the internet each time we cleaned it. So, anyway, if you guys ever have
a problem like this, it wouldn't hurt to check the scheduled tasks!

 

John-AldrichTile-Tools

 

 

 

 

 

 

  _____  

If this email is spam, report it here:
 
<http://www.onlymyemail.com/view/?action=reportSpam&Id=ODEzNjQ6MTAxNDQ1NjgxN
TpwanBAcHNuZXQuY29t> http://www.OnlyMyEmail.com/ReportSpam 
THIS ELECTRONIC MESSAGE AND ANY ATTACHMENTS ARE CONFIDENTIAL AND PROPRIETARY
PROPERTY OF THE SENDER. THE INFORMATION IS INTENDED FOR USE BY THE ADDRESSEE
ONLY. ANY OTHER INTERCEPTION, COPYING, ACCESSING, OR DISCLOSURE OF THIS
MESSAGE IS PROHIBITED. IF YOU HAVE RECEIVED THIS MESSAGE IN ERROR, PLEASE
IMMEDIATELY NOTIFY THE SENDER AND DELETE THIS MAIL AND ALL ATTACHMENTS. DO
NOT FORWARD THIS MESSAGE WITHOUT PERMISSION OF THE SENDER. 



THIS ELECTRONIC MESSAGE AND ANY ATTACHMENTS ARE CONFIDENTIAL
AND PROPRIETARY PROPERTY OF THE SENDER. THE INFORMATION IS 
INTENDED FOR USE BY THE ADDRESSEE ONLY. ANY OTHER INTERCEPTION,
COPYING, ACCESSING, OR DISCLOSURE OF THIS MESSAGE IS PROHIBITED.
IF YOU HAVE RECEIVED THIS MESSAGE IN ERROR, PLEASE IMMEDIATELY
NOTIFY THE SENDER AND DELETE THIS MAIL AND ALL ATTACHMENTS. DO NOT
FORWARD THIS MESSAGE WITHOUT PERMISSION OF THE SENDER. 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<image001.jpg>>

<<image002.jpg>>

Reply via email to