TDSS infections – quarterly report

2010-05-01

Alisa Shevchenko

eSage Lab, Russia
Editor: Helen Martin

Abstract

The TDSS/TDL rootkit is the cause of many a headache for anti-virus vendors. Here, Alisa Shevchenko presents a report and analysis of statistics collected from the users of a TDSS removal tool during the first quarter of 2010.


Our first article about the TDSS malware was published a year ago [1]. A relatively minor threat back then, today TDSS/TDL is a widely discussed topic in the security industry, and the cause of many a headache for anti-virus vendors. Moreover, the rootkit’s functionality has changed significantly during the year.

More than six months have passed since we released the TDSS Remover and disclosed its architecture [2]. Since then, some anti-virus vendors have also released dedicated TDSS removal tools. Among them are TDSSKiller from Kaspersky Lab and TDSS Cleaner from Norman.

The following article presents a report and a basic analysis of statistics collected from the users of TDSS Remover during the first quarter of 2010. (Note that, for users, the sending of information to us is optional, thus the data presented here may not be complete.)

Overall statistics

Figure 1 shows the overall usage of the TDSS Remover (i.e. the approximate number of tool runs each day) between January and March 2010.

TDSS Remover statistics.

Figure 1. TDSS Remover statistics.

There are some notable peaks and slumps on the graph, which correspond to some major TDSS-related events:

  1. The peak around 16 February reflects an increase in use of the tool due to the release of the MS10-015 update. The update caused a blue screen on all TDSS-infected systems [3], thus making users aware of the infection.

  2. The slump after 28 February can be explained by the following:

    • An upgrade (TDL3.27) was applied to the rootkit’s engine around 25 February, which rendered all existing removal tools (including TDSS Remover) useless.

    • Because of the issue with MS10-015, a considerable part of the TDL botnet was destroyed.

  3. The blank period from 6 to 13 March was due to a technical issue with data gathering.

  4. An update to TDSS Remover (enabling it to remove TDL3.27) was released on 7 March, and the data-gathering issue was fixed, so all the data beyond 7 March is accurate.

TDSS infections by country

Figure 2 shows the distribution of TDSS Remover by country, thus it also gives an approximate idea of the distribution of TDSS malware.

Geographic split of TDSS Remover usage.

Figure 2. Geographic split of TDSS Remover usage.

However, the statistics presented on this chart should be treated with caution, because some of the underlying data may reflect marketing trends rather than actual malware prevalence. Specifically:

  1. Russia (RU) is prevalent and Ukraine (UA) has a notable representation on the chart because we are based in Russia and have a dedicated Russian website.

  2. The Netherlands (NL) is prevalent and Belgium (BE) has a notable representation because the tool has appeared in the local news in these areas.

Thus the plot shares for Russia, Ukraine, The Netherlands and Belgium can be assumed, in reality, to be somewhat smaller than shown in Figure 2.

To summarize, we believe that TDSS infection is most prevalent in the United States, followed by Russia, a number of European countries including Great Britain, France, The Netherlands and Belgium, followed by Canada, Germany and Australia.

Rootkit files and versions

Figure 3 shows the distribution of different file types and the names of malicious executable files.

Distribution of different file types and names of files.

Figure 3. Distribution of different file types and names of files.

Since the release of TDL3 at the end of 2009, which infects system drivers, the rootkit no longer stores its payload in dynamic libraries. Thus, the 28% share of dlls on the chart represents older versions of TDSS which are still active.

Executable files (.exe) are actually custom malware with rootkit functionality, such as Magania, Kido, ZAccess and a number of Bankers. The TDSS rootkit itself does not utilize any .exe files.

A single .com file plus an insignificant number of autorun.inf files represent a very early version of TDSS which attempted to spread by infecting removable drives.

System driver files are prevalent on the chart because they are the core of all versions of the TDSS rootkit. Among the malicious .sys files, the most common are the original Microsoft drivers atapi.sys and iastor.sys, which are infected by TDL3. From these statistics we can see that users with IDE drives (i.e. those whose atapi.sys is infected) prevail significantly over users with other drive types (i.e. whose iastor.sys file is infected).

Random driver files are generated by an old version of TDSS which does not infect system driver files, and which is payloaded by a number of complementary dlls. The ratio of dll files to randomly named driver files (28%:12%) can be explained because, on average, one driver file is accompanied by three dll files on the same infected machine.

Other names of system drivers represent various infected miniport drivers.

Anti-virus protection that failed

Figure 4 shows a distribution chart of the anti-virus programs that were installed on users’ systems when they had an active TDSS infection.

Anti-virus programs installed on users’ systems when infected with TDSS.

Figure 4. Anti-virus programs installed on users’ systems when infected with TDSS.

We did not deliberately set out to collect statistics on anti-virus software, but because some security products block their files from being read (and thus trigger the anomaly-based detection mechanism of TDSS Remover), the files appeared in our reports.

The total percentage of anti-virus-equipped systems among all reported cases is 12%, including less than 1% of clean reports.

  • Kaspersky products were identified mostly by fidbox*.* files, which are data-indexing storage files. They were also identified by encrypted executable files named klick.dat and klin.dat, and also by kernel drivers kl1.sys and klif.sys.

  • avast! is notable for almost a dozen .sys files, all of which are blocked from being read and appear in the TDSS Remover’s output.

  • Dr.Web has a single blocked file: dwprot.sys.

  • Agnitum Outpost has three blocked files: afw.sys, afwcore.sys and sandbox.sys.

  • McAfee was identified by the encryption provider driver derived from SafeBoot.

Notes:

  1. An anti-virus solution may fail to detect a particular piece of malware due to outdated signature databases (the user’s fault for not applying the recommended updates regularly). However, detection should not be a problem for an anti-virus product with good heuristics.

  2. An anti-virus solution that failed to remove the malware will not appear in our statistics unless it implements any rootkit-like features.

Conclusions

In the wild, two TDSS modifications are active: the old TDL2, which features payload dlls and randomly named files and which does not infect system drivers, and the new TDL3, which infects the system disk drivers atapi.sys and iastor.sys. The latter prevails significantly.

Other known TDSS modifications are seen rarely, if ever, in the wild. Among them are the ancient TDSS version with fixed filenames, the old version which is distributed via removable drives, and the minor TDL3 version which infects miniport drivers.

TDSS infection is most common in the United States, Russia and parts of Europe.

Bibliography

[1] Shevchenko, A. Case study: the Tdss rootkit. Virus Bulletin, May 2009, p.10. http://www.virusbtn.com/pdf/magazine/2009/200905.pdf.

[2] Shevchenko, A.; Oleksiuk, D. Everybody lies: reaching after the truth while searching for rootkits. Virus Bulletin, August 2009, p.6. http://www.virusbtn.com/pdf/magazine/2009/200908.pdf.

[3] The Microsoft Security Response Center. Update – Restart Issues After Installing MS10-015. http://blogs.technet.com/msrc/archive/2010/02/12/update-restart-issues-after-installing-ms10-015.aspx.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.