Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

TDSS: Silent but DEADLY

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
Earth Bound Misfit Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jan-19-10 01:21 PM
Original message
TDSS: Silent but DEADLY
Edited on Tue Jan-19-10 01:22 PM by Earth Bound Misfit
TDSS: Silent but Deadly
EDIT LINK: http://threatinfo.trendmicro.com/vinfo/articles/securityarticles.asp?xmlfile=111209-TDSS.xml


First seen in 2008, TDSS was known for its ability to exist in systems without being discovered and the challenge it presents in terms of cleanup. The name "TDSS" was derived from a string that was consistently seen in dropped component files and registry entries in earlier variants although this later changed to mere random strings, which added to the difficulty in detecting TDSS samples.

TDSS often serves as a component for other malware, specifically FAKEAV variants and DNS changers.

-snip-

It's All About Blending In

Upon execution, TDSS drops a .TMP file in the %User Temp% folder. The said file whose file name varies performs the initial installation of all other malicious components.

Installation begins by registering itself as a system service. To do this, the dropped .TMP file copies a legitimate Microsoft Windows .DLL file and modifies it to load the .TMP file. It then exploits a vulnerability on the Microsoft Windows "Known DLLs" list to add the previously modified DLL into the list of .DLL files to be loaded into memory.

snip

Basically, what TDSS does first is that it makes the system think that the malware is just any other normal process then creates a rootkit component that hides all evidence of it doing so.


Getting Down to Business

Once the rootkit component has been deployed, it drops a .DLL file in the %System% folder. The said file is injected into SVCHOST.EXE, during which it downloads more component files from the Internet.

Downloaded component files include configuration files that contain commands to execute as well as URLs to download more files from. It performs both HTTP GET and HTTP POST requests from and to the URLs and saves any downloaded file in the affected system. The downloaded file contains commands that can be executed by a remote user on the affected system. Some of the said commands are the following:

Check command version
Display popup advertisements
Download other files (other DLL files and updated copy of TDSSserv.sys)
Load certain modules from downloaded .DLL files
Prevent programs, mostly antivirus applications, from running on the affected system
Set command delay
Upload log files (error logs, list of processes, OS version)
Different content are downloaded from different URLs. Thus, it is possible for the executed commands to differ from one system to another. The nature of executed commands may also depend on what malware is using TDSS as a component.

It's What's Under the Hood That Matters

The structured approach of TDSS in performing its routines on an affected system is not the only thing notable about TDSS. It has also been considered problematic by antivirus analysts due to its sophisticated means to evade analysis.

snip

The Silver Bullet

In most things, it could take the failure of a single component to shut down a whole system. For TDSS, security analysts consider that component to be the one that keeps them in the dark: the rootkit component. By disabling the rootkit service, all the malicious filles, processes, and components are placed into view, making analysis much easier to conduct.
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
Jazzgirl Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jan-20-10 12:55 PM
Response to Original message
1. Excellent post EBM!
I have had to remove that service from more than one badly infected machine. It is a real pain in the bu**.
Printer Friendly | Permalink | Reply | Top
 
Earth Bound Misfit Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jan-22-10 09:12 AM
Response to Reply #1
2. Thanks,Jazzgirl....
Check out this report by Dr.Web--- BackDoor.Tdss565 and it's modifications (aka TDL3)

http://www.drweb.com/static/BackDoor.Tdss.565_%28aka%20TDL3%29_en.pdf

TDL 3 is the most advanced version of this malware.

BTW, I downloaded and saved this report---Avira (Free) picked it up as a virus. (False positive)
I use Avast Free now, (which I really like) not because of this FP, I just like to experiment with & change AV's every few months. AVG has become too invasive & too much of a resource hog IMHO. Avira Free did not include an e-mail scanner--Avast does so I'll probably stick with Avast.
Printer Friendly | Permalink | Reply | Top
 
Jazzgirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jan-22-10 04:48 PM
Response to Reply #2
3. Thanks for the link EBM!
I'll download and check it out. I like NOD32 and have used it for years and never get infected. Of course, it isn't the only thing I depend on but it has served me well. I try to keep this old brain as up as I can. Thanks!
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 03:31 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC