A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #9725  by EP_X0FF
 Thu Nov 17, 2011 7:11 am
kmd wrote:any additional tips for removal in n00bs style? :D :mrgreen:
Using Paragon Partition Manager BootCD as example (Russian lang). There is also manual recovery from different OS/PC but I will skip this.

1. Boot from CD

Image

2. Run Partition Manager, see MaxSS allocated partition set as active and main Windows partition without "Active" flag.

Image

3. Set your Windows partition to be "Active" so OS can boot from it.

Image

4. Delete rootkit allocated partition or unset it "Active" flag.
Note if you unset flag you can delete this partition later through Windows Computer Management -> Disk Management Console.

Image

5. Confirm changes and reboot to boot normally from harddisk

Image

WARNING.
MBR write operations are unsafe. Make sure you have backup of all your really important data before changing anything.
 #9823  by kareldjag/michk
 Tue Nov 22, 2011 12:24 pm
hi,

Another DRACULA for TDL4 family from BitDefender:
http://www.malwarecity.com/community/in ... howfile=43 32 bit
http://www.malwarecity.com/community/in ... howfile=44 64bit

As pointed out by Kamarade EP_XOFF, MBR and disk tasks in general requires a non live system...as in real life with chirurgial tasks!
And Linux live CD (forensics) can also be helful.

Regards
  • 1
  • 4
  • 5
  • 6
  • 7
  • 8
  • 15