• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2205
  • Last Modified:

Malware Hosts file hidden and attrib un editable XP

G'day all

Just finished removing a painful last aprt of a infection and wanted some advice.

Rmoved a rootkit with combo fix ,
cleaned up other multiple threats with malwarebytes.
cleanup browser with hijack this.

but the client still complained of google redirects.

After much pain
I found the host file missing under c:\%systemroot%\system32\drivers\etc
when i tried to copy a fresh HOSTS back i got a replace existing file warning.
But acces was denied.
unhid files in folder options still couldnt see the host file , tried command prompt aswell.

So i booted from my falcon four boot disk, into mini XP ( ramdisk)
And i could the see the host file (transparent)

opened it up and it had a heap of IP redirects for all things google , to a chinese Proxy i assume to facilitate some sort of piggy in the middle data collection.

anyways i tried to delete it and it said access denied
I tried to change the file attributes via attrib command again with access denied
I tried to change NTFS permissions with command also with access denied.

All I could do to facilitate a repair was rename it the file to  "hostsold" which it allowed me to do.
then I copied a fresh hosts file in its place..

Viola problem solved !

My question is ?
How come i couldn't modify the comprimsed file and see it under the normal windows , is there some sort of file system hack going around?

Even the recovery console acces denied me under administrator account. nor could i see it under DOS.

This worries me that there is some file system exploit allowing this file to exist in limbo, invisble when the OS is running
and uneditable outside the operating system.

Any Help would put my mind at ease
  • 2
  • 2
  • 2
  • +3
4 Solutions
Dave BaldwinFixer of ProblemsCommented:
I don't know how it's hiding but I use Linux Live CDs to remove malware files.  Linux doesn't care about Windows permissions.  Knoppix is what I use the most but I've used my Ubuntu 8.04 CD for something I couldn't do with Knoppix.
Dave BaldwinFixer of ProblemsCommented:
I use Linux Live CDs to remove malware files.  Linux doesn't care about Windows file permissions.  I use Knoppix the most but Ubuntu 8.04 did one job Knoppix couldn't.
In these scenarios, I usually have to take ownership of the file/folder before access is restored.  Here's an article on how to do so: http://support.microsoft.com/kb/308421

By the way, did you run Malwarebytes using a quick scan or the full scan?  I've found the full scan in many cases will find the trickiest malware that gets missed sometimes by ComboFix.

Before running Malwarebytes (quick or full scan) I always empty temp files to speed up scans.  A good utility for this is TFC (http://www.geekstogo.com/forum/files/file/187-tfc-temp-file-cleaner-by-oldtimer/) as it will empty temp files for ALL Windows user accounts instead of only the one you're logged into currently (Comodo System Cleaner & Ccleaner don't get all accounts).

Hope this helps.
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Trt this the next time. Works :)

1-Create a system restore point
2-Download unlocker + Microsoft's hosts fixit
http://ccollomb.free.fr/unlocker/unlocker1.8.8-portable.zip (av may detect it as a threat so disable av temporarly, if so)

3-Show hidden files

4-Run unlocker and browse to
Use unlocker to delete the host file

5-Reboot and run Microsoft's fixit to create new host file

6-Reboot again and check hosts file

>Or slaving the drive and using unlocker to delete it
Robby SwartenbroekxMSP engineerCommented:
First in the mini XP try to take ownership of the file.
Then give everyone full access on security level.

boot into the full Windows and change the file security to
- administrators: full access
- system: full access
- users: read and 'read and execute'

ComboFix would've already replaced the Hosts file when it removed the rootkit.

Do you still have the ComboFix log?

Also try using TDSSKiller.
Download TDSSKiller and save it to your Desktop.

Extract the file and run it.
Make sure all other windows are closed and to let it run uninterrupted.
Reboot your machine and see if the infection is gone

Kramer8uAuthor Commented:
Nah combofix froze just b4 stage 1
and I tried resetingbtge permissions and attributes via bot disk.
Again I have removed and checked with root repeal the rootkit ( fake sys driver) and Trojans. Just was curious why I couldn't see in os or edit out of os the compromised host file

Usually when you unhide folders etc, you can see it.
Using Mini Xp will also lead to the file being "locked", hence using unlocker to delete it or use a Linux boot cd :)
Kramer8uAuthor Commented:
Ok well it doesn't sound like I should be too concerned then.
I'll split the points across those who suggested additional tools a processes to refine my removal process.

Thankyou all

Since you mentioned that ComboFix froze, I should mention another tool that I'll run when either CF or Malwarebytes won't run.  To kill malware processes that prevent your other tools from running, or prevents executables or task manager, run rkill.com or any of its renamed variants, which you can obtain here: http://www.bleepingcomputer.com/forums/topic308364.html

It has become a favorite tool of mine and my fellow road-techs... one of our "secret weapons".
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 2
  • 2
  • 2
  • +3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now