Very nasty new threat.

vaylon

Senior member
Oct 22, 2000
219
0
71
Just wanted to give some info on this bug.

I found it while browsing around my xp sys32 folder.

it started off as 2 files ddaya.dll and ddaya.exe. Neither file is recognised by any virus software. I ran kaperky, avg, avast and symantics. Not a one found it, none of the spyware software worked either.
Did a little searching and found out that ddaya is a trojan dropper. But it is polymorphic.

Hijack this worked for just 1 boot. After that?, it corrupted the HJT files. Tried to reinstall HJT but it just wouldn't work after the first report. Process monitor worked but then its log files became encrypted. From what I gathered it was a keylogger, history reporter. At this point it was intrusive but not destructive and it embbeded code into smss.exe.

The fun started when I tried to delete the files in safe mode. They deleted until the next boot. Then they were back but with buddies. ddaya.dll and ddaya.exe had been joined by ayadd.dll and ayadd.exe. I also had two instances of smss.exe running and two instances of msconfig.exe . I them boot to a command prompt. Delete each file and replace the real smss.exe with a fresh file from the xp disc. Everything seems good, till the next boot.

Now they are all back and even more friends.
all the files above were copied from the sys32 folder to other windows folders. Like help folder, pchealth folder, system, web, temp, resorces and inf. I also now had extra copies of infected svchost files starting to pop up and 15 instances of svchost processes and smss process. I also had some extra winlogon.exe's running.

So now I call the big guns and get to talk to the techs at avast.
They are aware of the bug but at this time there is nothing that can be done to get rid of it. It's been around since june and he called it a mutating polymorphic spiraling trojan. It can come into your system embedded in a picture, a web page, and just about anything else that it can embed itself into. Its also been found on linux and apple system's. So this one is not picky.
So the guys went thru all the details of its personality and code and behaviors.Long story short, it can't be gotten rid of at this point. It can be detected, but that starts an entire chain of events that are worse. So thats why no software will detect it .
Then they tell me that one person reported being able to delete all the files and recover by installing the drive as a slave on another system and going in and deleting all the infected files and replacing many of the windows files with fresh copies from a backup cd.

So I remove the drive and 5 hours later after deleting and reinstalling tons of files, I reinstall the drive into my system and everything seems cool.
Till the next boot!
It takes 45 minutes to load windows and the windows folder has grown by a factor of 3. Its now over 9 gb in size. I had 102 processes running, countless svchost.exe, smss.exe, winlogon.exe, firefox.exe,alg.exe,sytem.exe, lsass.exe. explorer.exe, msconfig.exe and more.
So now I know its a futile attempt, but I just want to see if any antivirus software can find it. So I boot into safe mode and have at it. NO VIRUS, WORMS OR TROJANS DETECTED. So just out of curisity I boot into a command prompt and replace the entire windows system folder, system32 and pchealth folder with copies I made earlier. They were most likely infected but no where near what it was now. Reboot.

Seemed a little slow but it came up and worked. Then it rebooted itself.
This time it took over 2 hours to come up and when it did? the windows file had grown to 21GB. then it rebooted itself again. so I go to bed.
Next morning it still hasn't come up, but its trying. Finally after almost 6 hours it loads. 276 process's and 100% memory and cpu usage. Then it reboots again.
This time a "oUT of memory error" appears on the load screen after a couple of hours.
So I pull the drive and install it on another to look at the drives contents.
131 GB windows folder and almost ever other file on the system had been doubled and tripled.
So I reformatted the drive! along with all the other drives in the house.
Now its all gone.

So if you get curious and go looking and find something? realize what can happen.

If you do have it or any variant of ddaya, which could be ayadd, dayad,yyayd, ect ect ect. Realize that you are being monitored. So don't do anything important.
Make backups of anything important and set aside till a resolution is found, don't use when you fix the OS because it will most likely just get infected again.
The entire hard drive has to be erased and reformatted, this includes all partitions and boot sectors.
But on the other hand, if you just leave it alone? it will watch you and spread to other systems but the monitoring of your activities goes off into never never land. There's nowhere for it to be sent. Home is gone, so the packet just floats in cyberspace trying to get home.

Like the guy from avast said, "This was probably made by a 6 year old hacker, just for the fun of it"
 

blackangst1

Lifer
Feb 23, 2005
22,902
2,359
126
Wow. Just wow.

/makes note to go home and do a search for this.

Im curious if this by passes the utilities that wont allow registry changes without confirmation? I use tea timer on spybot S&D, but there are a few that lock down the registry.
 

vaylon

Senior member
Oct 22, 2000
219
0
71
Spybot never detected anything on mine. Neither did windows defender.
WFP was also completely useless.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
Can I suggest forwarding samples to the antivirus vendors, see post #2 in this thread

Also, do you have any suspicions as to how your computer was infected?
 

blackangst1

Lifer
Feb 23, 2005
22,902
2,359
126
Originally posted by: vaylon
Spybot never detected anything on mine. Neither did windows defender.
WFP was also completely useless.

Vaylon I think you misunderstood me. I understand spybot didnt catch it; however, there is a feature in spybot called tea timer. It doesnt turn on by default. It locks down your registry and if ANY changes are made it gives you a pop up asking if you want to make the change. for example if you go into regedit and make a change, it pops up. I would find it hard to believe something like this could make registry changes with a registry lock down tool catching it.

Just curious.
 

John

Moderator Emeritus<br>Elite Member
Oct 9, 1999
33,944
1
0
Originally posted by: vaylon
it started off as 2 files ddaya.dll and ddaya.exe. Neither file is recognised by any virus software. I ran kaperky, avg, avast and symantics. Not a one found it, none of the spyware software worked either.
Symantics? You should upload it to VirusTotal.com

Originally posted by: vaylon
Spybot never detected anything on mine. Neither did windows defender.
WFP was also completely useless.

I'm not at all surprised since Spybot & WD have pathetic detection rates. Is WFP referring to Windows File Protection?

 

bsobel

Moderator Emeritus<br>Elite Member
Dec 9, 2001
13,346
0
0
It's been around since june and he called it a mutating polymorphic spiraling trojan. It can come into your system embedded in a picture, a web page, and just about anything else that it can embed itself into. Its also been found on linux and apple system's. So this one is not picky.

:roll: First off, nothing is coming in embedded in an image or a webpage (sans a day zero threat) if your machine is properly patched. Your suggesting looking at some random image can cause this on a patched machine, wrong. Second, it's not jumping from PC to Linux and Apple systems.

"This was probably made by a 6 year old hacker, just for the fun of it"

Malware is now primarily made by organized groups for financial motives.

Bill
 

Medea

Golden Member
Dec 5, 2000
1,606
0
0
It's been around for about two years, and it's a Vundo variant.

Edit: See, http://research.sunbelt-softwa...tumonde&threatid=15196

What you need to know about Vundo is that it will make backup copies of itself in the \system32 subdirectory. So, for example, let's say that abcde.dll is a Vundo file. So, many times what you'll see in \system32 will be:
abcde.dll
edcba.dll
abcde.bak
abcde.ini


Note that one of the files is the dll file backwards. Not every Vundo infection will have these extra files, but a large majority of them will have one or more, depending on the variant.

There will also be the downloader file which varies by name as well as by location. Also, many times there will be a file in the 'conhook' family; and that's usually located in the system32 folder.

This why stopping the dll from running in msconfig doesn't help.

If you run HJT, Vundo infections are picked up by having the same dll files under an O2 entry (Browser Helper Objects or "BHO's") and under an O20 (Winlogon Notify registry key). It will look like the following:
O2 - BHO: MSEvents Object - {random CLSID} - C:\WINDOWS\system32\abcde.dll
O20 - Winlogon Notify: abcde - C:\WINDOWS\system32\abcde.dll


You can also pick it up a Vundo infection in a HJT log because there will be no O2 and O20 entries in the log.

Running VundoFix will usually nuke the infection by deleting any vundo files as well as the associated reg keys.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |