Search n00bz.net
« PS3 JailBreak Step-by-Step (ver3.55) | Main | Metasploit Pro + Bypass Win UAC FTW! »
Wednesday
Jan052011

virusscan_bypass.rb: Now with a lame security bulletin

@mubix shared a link with me earlier this morning.  Security Bulletin - VSE 8.7 and earlier Metasploit payload attack

After my research and loss of faith in Anti-Virus technology, I decided to look at this further.

 

Let's look at the Bulletin. 

McAfee is aware of a publicly disclosed attack that could disable VSE running on a customer’s machine.

There was an update to the Metasploit Framework on Christmas Eve that added a script from Mert SARICA that silently kills McAfee VirusScan as well as some other fun options.  This was in revision 11411.

This isn't an attack but something an attacker could do once you click on that email link that promised you a gazillion dollars from some guy who needs your help transferring his dead cat's fortune out of a war torn condominium complex. 

This attack is not a standalone attack, but acts as a payload to be chained via another attack.

Once again, at this point you are owned and Game Over already!

  The attack was disclosed in a public tool.

While this is a Metasploit script, the only tool I see is the one who QA'ed the DAT file (6209).

Mitigating Factors

  • McAfee has released a DAT file (6209) which detects the Metasploit plug-in used to run this attack.

 

Updated to the latest version!

I am protected....  NOT! WTF?

 

The target machine is Windows XP Pro SP3... Fresh install, OS patched, installed McAfee AV and updated.

I generated a meterpreter executable and copied it to the desktop.  Great On-Access Protection!

I ran the executable and now I have a session.  Let's list the processes running.

I found with a pid of 916 we have McShield.exe.

Running as an Administrator, I run the script.  This will upload an executable to the target and add it to the exclusion list.  I am going to choose to kill McAfee all together. 

It should be noted that McTray.exe was also killed so we don't get the tray icon.  However on the target machine, the user would only see the tray icon silently disappear. We can confirm that McAfee is McGone by looking at the process list. 

We now have full control of the target machine however probably don't want it since it has been owned and now has the Zeus Trojan. 

On a reboot, McAfee is back however it requires a reboot.  Trying to load McAfee again before the reboot results in a notification of ownage!

Let's recap the timeline.

Script was added 12/24: Merry Christmas

Security Bulletin was issued 12/30: Happy New Year

On 1/5 the scipt still kills McAfee AV

 

How can you protect yourself?  Do you load Symantec?

Watch Mubix uninstall Symantec's SEP. 

http://www.room362.com/blog/2010/11/16/silently-uninstall-sep.html

All of this was released in 2010 and prior.  I can't wait to see what 2011 brings.

Welcome to 2011, the year of the #FAIL... again.

 

UPDATE 01/06/2010

It looks like the virusscan_bypass.rb scipt had a bug that caused the termination of the McShield Icon and the error box.  The script has been updated. 

Download the latest revision here: 11478

I grabbed it this morning and tested it out.

We have our process list before running the script.

We run the script as the local administrator.

Now we check the process list again.

Now for the sweep.  Show me the Shield!  Survey says:

 

References (18)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Response
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: Dark Souls (PC)
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: Survey Bypasser
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: Instagram Bot
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: Starbound gameplay
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: %anchor_text%
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: App
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: secret info
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: logo design studio
    A bulletin board is a surface intended for the posting of open messages, for instance, to promote things needed or available to be purchased, proclaim occasions, or give data. Announcement sheets are regularly made of a material, for example, stopper to encourage expansion and evacuation of messages.
  • Response
    Response: dog walking Sydney
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Response: Matthew Sample
    virusscan_bypass.rb: Now with a lame security bulletin - Blog - n00bz Network
  • Response
    Access errors can occur when working with a network of programs, not including browser! Himself when faced with such an office network administration!

Reader Comments (8)

Author fixed the script.
Killing mctray after mcshield caused by a bug on the script but now on it seems to be fixed and it follows the correct order on kill.
It works, still shows tray and no warning message.

January 5, 2011 | Unregistered CommenterMeterpreter

I think QA'ed one faced with the bug at the runtime and thought that it was fixed and released it but did not know that it was because of a bug on the script.

January 5, 2011 | Unregistered CommenterBlabla

Security Companies need to analyze the root problem and not do the quick fix. I wonder how many products flag "or 1=1" and miss "or 2=2".

Now the scipt has been fixed and even more effect. +1

I love leaving that Shield in the task bar. Provides that "feel good" security the users pay for!

January 5, 2011 | Unregistered Commentern00bz.net

If it still works and does not kill mctray, It would be better to update your writing. Re-testing would be better. Btw Mcafee does not detect meterpreter payload, why don't they focus on meterpreter instead of a script ?

January 6, 2011 | Unregistered CommenterMcChicken

I just looked at the update to the script and will re-test using the latest revision. I'll post the results shortly...

January 6, 2011 | Unregistered Commentern00bz.net

Repository of the code updated 16 hours ago - http://www.metasploit.com/redmine/projects/framework/repository/revisions/11478/entry/scripts/meterpreter/virusscan_bypass.rb

January 6, 2011 | Unregistered CommenterMcChicken

So it still works, great :)

January 6, 2011 | Unregistered CommenterMcChicken

That is an extremely well written article.I'll make sure to bookmark it and return to learn more of your helpful

April 10, 2014 | Unregistered CommenterBridal lehenga

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>