Home Malware News Trojan Rootkits (Rootkit.Gen) Disables AntiVirus Apps & Security Sites

Trojan Rootkits (Rootkit.Gen) Disables AntiVirus Apps & Security Sites

Posted: July 22, 2008

A trojan rootkit variant (part of the Win32.Rootkit.Gen or Rootkit.Gen family group) continues to threaten computer users and has the ability to prevent anti-virus software from running to scan and remove parasites on your computer. Computer users who are infected with the rootkit variant state that it does not allow them to open their anti-virus program or visit websites that assist them in the removal of the infection such as symantec.com and update.microsoft.com. It is apparent that serious issues will occur for computer users who have a Rootkit type of infection on their computer.

Understanding Rootkits

A Rootkit may be composed of one program or a combination of malicious programs that are designed to take control of your computer. Basically, a rootkit will allow hackers or outside attackers have root access to an infected computer. They can virtually act as an administrator and have access to your system without your permission. A rootkit like Rootkit.Gen runs in the background and limits usage of certain programs or access to websites that could assist you in removing the rootkit infection. Other rootkits have been known to act or pretend to be proxy servers and manually spread from executable files.

Rootkits were originally legitimate programs that gave a user or administrator control to fix issues on an unresponsive computer. Nowadays, hackers have used this type of technology for malicious purposes (usually to extort money) at the expense of computer users, who often times are unaware that they've been infected with a rootkit. Just like Trojans or Rogue Anti-Spyware you have to find means of protecting yourself from rootkit infections and other malware.

Rootkit Symptoms to Watch Out For

  • The anti-virus program that you currently have installed no longer runs.
    You notice that you are no longer protected by your antivirus program. You may get popup alerts from Windows that say you are not protected by an antivirus program. If you normally run antivirus software and it doesn't run upon command, then this is a clear indication that a setting has been changed without your permission.
  • Your computer locks up or fails to respond to common inputs.
    At times you notice that your mouse is not moving or a program ceases to function or respond to commands given to it by you.
  • Settings in Windows change without your permission.
    When you access certain programs or perform actions on your Windows desktop, you notice that a setting has been manipulated or changed from what you originally set it as. This can be anything from your background or screen saver changing to your taskbar hiding itself.
  • Disabled web browser applications.
    You are not able to open Firefox or Internet Explorer to surf the web. Sometimes malicious applications block your access to the Internet by shutting down web browser applications.
  • You experience excessive network traffic or your network connect becomes slow or disconnected.
    You may notice web pages or network actives to be intermittent or cease to function properly at times.

What to Do to Disable Rootkits?

So you've been infected by a rootkit and it's causing havoc on your computer. Most of the symptoms mentioned above you're experiencing occur after the presence of a Rootkit.Gen infection. In order to gain control of your computer, you must disable the Rootkit.Gen and its variations.

IMPORTANT: Although the instructions listed below have been added to help you disable a rootkit on your computer, there's no guarantee that the rootkit and other malware will not reappear on your computer. Make sure to follow the instructions with caution and back up your computer before you start. Instructions are to be used at your own discretion. If you're not sure what to do, then it's advised that you get help from an experienced computer technician.

  1. Locate and install the program called RootkitRevealer from SystemInternals. After installation, run the RootkitRevealer so it may scan your system to identify files that are marked as hidden from Windows API. Once the files are no longer hidden you can then determine which ones need to be removed so you can disable the rootkit. The file 'clbdriver.sys' is used as an example of the main file of a rootkit which can be located in the folder C:\Windows\System32\Drivers.
  2. Boot your computer from a Windows Installation CD into Recovery Console Mode.
  3. Delete the following files which are located in the default Windows directory C:\WINNT or %WinDir%:

    %WinDir%\system32\clb.dll
    %WinDir%\system32\clbcatex.dll
    %WinDir%\system32\clbcatq.dll
    %WinDir%\system32\dllcache\clb.dll
    %WinDir%\system32\dllcache\clbcatex.dll
    %WinDir%\system32\dllcache\clbcatq.dll

  4. While you are still in Recovery Console Mode, enter the following commands to kill the file:

    cd \
    cd c:\windows\system32\driversdir clbdriver.sys Should return '1 File Found'
    del clbdriver.sys
    dir clbdriver.sys

  5. Reboot your computer.
  6. Open up your registry editor (regedit) and find and delete the following registry keys:

    HKEY_LOCAL_MACHINE\SOFTWARE\MRSoft
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\clbImageData
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\clbdriver
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\clbdriver.sys
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\clbdriver.sys
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\clbdriver
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\clbdriver.sys
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\clbdriver.sys

  7. Use the expand.exe command to extract the files explorer.exe and clb.dll from the i386 directory. This is basically copying the files over to the C:\Windows\System32 directory.
  8. Rename the explorer.exe file to something else such as explorer_new.exe.
  9. Open you registry editor again (regedit) and change the value of the key HKLM\software\Microsoft\WindowsNT\CurrentVersion\WINDOWS\shell from explorer.exe to the new renamed one (explorer_new.exe). If the name is not changed then the infection will return.
  10. Restart your computer. The rootkit should now be disabled.

Remember the instructions mentioned on this article are to be followed at your own discretion. We are not responsible for any complications that may occur when using the information provided above.

Simple Tips to Prevent Rootkits from Running on Your PC

  • Pay special attention to the settings of your privileges and what programs you allow to be installed by users. Do not give users the ability to install applications. In other words, do not allow guests or secondary users have many privileges to change settings.
  • Keep up-to-date on all available security patches. Verify your Windows update schedule and make sure automatic updates are on and running properly. It never hurts to manually check for any new updates or security patches that come available from the Microsoft update website.
  • Verify that you have firewall protection. Utilizing the built in Windows Firewall is always a good idea. The use of other firewall software can aid in the protection of infections as well.

What will these hackers and their Rootkits do next? Of course, there are other methods to disable trojan rootkits. If anybody has any new methods or developments about rootkits that they will like to add to this article, we encourage you to post a comment below.

10 Comments

  • Daniela Ivanova says:

    data of my pc will fall down

  • karen miller says:

    we reset back two days on computor and everthing seems to work for now
    still trying to determine how we got it in the first palce
    winantispyware2008 was the name of program that install on it own and i did get back my money =the credit caRD COMPANY CALLED ME AND SAID THE CHARGES WERE BEING SENT TO RUSSIA HOPE THIS HELPS SOMEONE ELSE

  • Fay says:

    I picked this up yesterday by using my memory stick on an infected machine.

  • sachin naik says:

    but do u think windows update is required when u have a good antivirus/antspyware/antirootkit software and a firewall

  • Max Johnson says:

    Did it read the credit card number from your wallet, or were you foolish enough to supply it blindly to an online pop-up without a second (of) thought?

  • Molly says:

    I have attempted to boot up my computer from a windows installation cd, but the computer appears to not recognize the keyboard until after the opportunity to order the computer to boot up from the cd has already passed. I attempted to do this with multiple keyboards and have gotten the same results with all of them. Could this possibly be the result of having a RootKit? If so, any suggestions for what I should do?

  • Rolando says:

    @Molly:
    try and change the settings in the BIOS, and then reboot... If it is set to boot from cd, you shouldn't have to select anything.
    take care.
    🙂

  • Mara says:

    It got in past avast somehow. There was an alert for a Trojan attack and I blocked it but it still got in as "Antivirus System PRO". The thing is that Antivirus System showed up in the task manager as jynrsysguard.exe (not sysguard.exe as I have found in many other places on the net). On top of not allowing me to update my antivirus software and such, I am unable to get into windows safe mode. Every time it starts going into it the whole system resets and goes back to the start giving me some error that windows could not be started.

    When I ran a boot time scan nothing showed up, the Antivirus System PRO must have been hiding the Rootkit. Antivirus System I managed to get rid of by: As soon as windows started I opened the task manager and waited for the exe file to show up and I ended the process(there is a couple of them). If the software opened before I opened the task manager then the only thing I could do is restart cause I couldn't open the task manger, my computer, or anything in the control panel. Not even total commander was allowed to accesses files. After I stopped the program from running I could search for the exe file in the C drive and deleted everything that it was associated to. (I never found any traces of it in the registry editor)

    Then I got on a different computer and got the virus database updates, installed them and ran a boot time scan and only then did it find 3 different files that were infected with the Rootkit-gen. All of them were deleted successfully but the problem still reminds. I can't enter Safe Mode and I can't access any sites that may help me or update programs or install new ones that require to get data from the internet. I'm going to try what it says above and see if that helps but if anyone else has any ideas I'd appreciate a hand.

    Thanks

  • Michael Rubin says:

    I'm not sure it is rootkit.gen because my software and antivirus respond; i update the latter as often as possible. But I frequently get a pop-up error from"acrotray.exe: instruction at 0x77c47fd4 referenced memory at 0x89ffff7 cannot be read. Click OK to terminate. Click CANCEL to debug. Nothing happened. Furthermore, the file has been deleted but apparently resides in memory. No trace in either task manager or msconfig. I need further advice.

  • Thomson says:

    I had a TR/rootkit.Gen on my computer and everytime i done a scan with Avira premium, it would find it but never remove it. I got bullguard security and when i installed the programe it asked me to restart the computer but when i did, it wouldnt let me back on. Everytime i turned the computer on the screen was giving me the option to restart in safe mode, Networks, Last good settings or start windows normally but when i chose any of them it would freeze and i wouldhave to turn it off at the wall. I took out that hard drive and installed a fresh version of windows onto a new one, Installed bullguard on that one then reconnected the other hard drive as a second drive. It let me on so i ran a scan with bullguard and it found the TR/rootkit.Gen and removed it. My system has been fine for about three days but now avira is warning me that its back. Anyone got any suggestions as to how i can get rid of it permanently?

    Any help would be greatly appreciated.
    Thanks

Loading...