Skip to content
Donner's Daily Dose of Drama
Donner's Daily Dose of Drama
  • The Good
    • Blogging
    • Consumer Protection
    • Environment
    • Ethics
    • Geek’s Home
    • Lisa Lanett
    • Medfield
    • Music
    • Parenting and Technology
    • Travel
    • wow
  • The Bad
    • Business
    • Ebay
    • Investment
    • Job search
    • Personal Finance
    • Politics
  • The Ugly
    • Information Technology
      • Business Intelligence
      • Content Management
      • Free Software
      • I18N and L10N
      • Java
      • Open Source
      • Mobile Devices
      • Open Source Business Intelligence
      • OSBI
      • SDA
      • Security
      • Smartphone
      • Software Best Practices
      • Software Engineering
      • SQL Server
      • Streaming Media
      • Web
    • Austria
    • Fiction
    • Hardware
    • iPod
    • Miscellaneous
    • Uncategorized
    • Video
    • Weekend Warrior
Donner's Daily Dose of Drama

Mebroot root kit infection (aka Sinowal, aka Torpig)

Christian Donner, April 3, 2009May 29, 2009

I am pretty sure I caught the Mebroot root kit last night, or some variant, and potentially some other things, too.
I was working when all of a sudden the machine rebooted, without a blue screen. It did an orderly shut-down and reboot (XP Pro SP III). I did not allow XP to boot back up, but instead booted Knoppicillin from DVD. This is a free Linux with a free version of Kaspersky, Avira Antivir, and BitDefender.
All three ran. pulled the latest signatures from the web, and found only 3 minor issues. One was the Move Networks video player that I need for ESPN360, the other two were 2 scripts in the Temperory Internet folder that my virus scanner had blocked access to anyways, so I don’t think they executed.

I booted back into XP and deleted the three files (I should have saved them for analysis, but they are gone). After doing this, IE8 (and Outlook) crashed upon start, and everything was very slow. There were very long timeouts for every mouse click, and the system would eventually freeze completely. I uninstalled IE8, reinstalled it, reverted to IE7, but I still got the crashes. I installed Windows Defender, checked running programs, checked all startup programs, checked and disabled all browser plug-ins, and disabled everything else that looked suspcious (which was not much, since I stay on top of these things all the time).

IE7 still crashed occasionally.

Then I started a trace on my Pix firewall while the XP machine booted, and saw some very interesting things:

Besides contacting Microsoft, the machine did a bunch of DNS lookups for wvvexfux.com and cheviram.com:

65.55.185.29 (Microsoft update)
74.54.224.242
208.76.56.56 Dns lookup wvvexfux.com
192.48.79.30 Dns lookup
216.239.34.10 Dns (Google)
192.12.94.30 Dns (Google)

72.14.221.104 google.no
71.243.0.12 Dns lookup

Then it sent HTTP requests to the two IPs below:

74.54.224.242 is wvvexfux.com

                        50 4f 53 54 20 2f 20 48 POST / H
54 54 50 2f 31 2e 31 0d 0a 48 6f 73 74 3a 20 77 TTP/1.1..Host: w
76 76 65 78 66 75 78 2e 63 6f 6d 0d 0a 43 6f 6e vvexfux.com..Con
74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 31 30 38 tent-Length: 108
0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c ..Connection: cl
6f 73 65 0d 0a 0d 0a e6 8a c4 17 e4 0f 18 5e 3f ose...........^?
78 4d 77 16 2b b6 1a f5 6d 6d 4b d4 d9 be e0 b2 xMw.
174.133.5.26 is cheviram.com, "mebroot calls home"

                        50 4f 53 54 20 2f 36 35 POST /65
33 39 39 34 31 37 45 45 38 41 33 41 43 36 2f 42 399417EE8A3AC6/B
31 59 47 59 51 4a 54 66 33 51 77 59 68 46 77 59 1YGYQJTf3QwYhFwY
48 4b 6c 33 32 7a 6e 31 77 45 6e 52 6a 73 69 45 HKl32

Both domains were registered as recently as a week ago, so this is indeed a very new threat. Unfortunately, I don’t know what process made the above requests, since it did all this prior to someone logging in. I also don’t know what data it sent in the POST request (just in case that someone can decipher the query string – I left out a few lines).

I updated the MBR from the XP Recovery  Console, and I am running the Knoppicilin scans again while I write this, but I am considering formatting the disk and doing a fresh reinstall – which will likely take all weekend and beyond. I will check what the firewall trace says once the scan is done tomorrow, and then decide.

Bottom line is, despite all my efforts, and despite running an on-access scanner and doing full scans with products of three different vendors, this thing was able to install itself. I wonder if IE8 re-introduced security holes that were previously closed, and that someone very quickly took advantage of them. Either way, I am more concerned than ever about logging on to my bank account from my workstation at home (I changed the passwords right away, of course). What do all the people do who cannot read a firewall trace?

Read this for an opinion on why these kind of threats are out there, and nobody really seems to care.

Update 4/4

Repairing the MBR seems to have done the trick. I ran several full scans today, and continuously monitored the firewall for suspicious traffic from this computer. I analyzed anything that I could not immediately explain, ran Google searches, trace routes, dns lookups, whois queries, etc, and it seems that the machine is clean. It appears to be much more responsive, and IE does not crash anymore.

I did not notice until today that Avira has a boot sector scan option. I am not sure it runs it when it does a full scan, and I don’t know if it would have found anything  yesterday. Today, it did not.

Update 4/5

Trustdefender has a more in-depth technical explanation of this threat, and describes the steps to verify an infection.

They also say that Mebroot does not compromise any system files – I did not want to rely on this assumption and reinstalled the XP Service Pack 3 and IE8.

It seems that the weakest point of this virus is that it triggers a system reboot. If your Windows suddenly tells you that it is closing down, be on alert. The best thing to do in this case would be to not allow it to restart, but to boot from the installation DVD, start the Recovery Console, and run FixMBR. In my case, it warned me that (and I forgot the exact wording) I had a non-standard MBR and asked if I really wanted to overwrite it.

Update 5/29

Not surprisingly, this subject keeps coming up in the news. I came across this interesting report about how Torpig generates pseudo-random domains to spread.

Related Posts:

  • Computer Build 2025
  • OpenVPN
  • Amazon threatens customer of 26 years
  • TyreWiz not working after battery change
  • The Voip.ms SMS Integration for Home Assistant

Information Technology Security Software Engineering Web IE8Internet Explorer 8MebrootRoot kitSinowalTorpigVirusWindows XP

Post navigation

Previous post
Next post

Comments (3)

  1. Pingback: TrustDefender Labs » New Mebroot Sinowal MBR Torpig variant in the wild - virtually undetected and more dangerous than ever
  2. mjt says:
    April 16, 2009 at 6:23 am

    So, would RootkitRevealer have helped/detected
    this strain? I’ve seen no mention whether this
    has been tried, although I’ve seen references
    to GMER. Interesting read:
    http://forum.sysinternals.com/forum_posts.asp?TID=18626

  3. Christian Donner says:
    April 16, 2009 at 7:21 am

    Mjt, unfortunately I did not run RootKitRevealer prior to running FixMbr. It did not reveal anything afterwards. I ran Combofix, however, for the first time on my machine, and it found and removed a handful files, one or two of which could have been related.

Leave a Reply

Your email address will not be published. Required fields are marked *

Pages

  • About
  • Awards
    • TechnoLawyer
  • Contact Christian Donner
  • Project Portfolio
  • Publications
  • Speaking Engagements

Recent Comments

  • Christian Donner on Sealing a leaky cast-iron fireplace chimney damper
  • Eric on Sealing a leaky cast-iron fireplace chimney damper
  • Christian Donner on Contact Christian Donner
  • Max on Contact Christian Donner
  • Christian Donner on Contact Christian Donner

Tags

AHCI Amazon Android ASP.Net AT&T Droid Drupal email Error failure featured firmware Garmin Godaddy Google honda Internet Explorer 8 iPhone Lenovo Lisa Lanett Modules NAS Nexus One Paypal Performance Privacy QNAP raid RS-407 sauna Security spam SQL SR3600 Synology T-Mobile T430s transmission tylö Verizon Virus VMWare Windows 7 windows 8.1 Windows Mobile
  • About
  • Awards
    • TechnoLawyer
  • Contact Christian Donner
  • Project Portfolio
  • Publications
  • Speaking Engagements
©2025 Donner's Daily Dose of Drama | WordPress Theme by SuperbThemes