Jump to content

RootKit hell


Recommended Posts

I have an active WINS server, it seems that whatever malware this is, it has crept in to every app, so I have added just one of them Apple has reset my Macs multiple times and doesnt seem to care that the gatekeeper failed, even on my brand new M1, iPhone 12 Pro, and more, I lost my small business trying to get everything back to normal, but even in the apple store directly after reinstall, the netbois was active. I was MDM locked out of my 2 week old computer. Best Buy said its a Rootkit, but legit, I'm losing my mind, because my media changes, Anti virus isn't picking up on the problem, but as you can see from the photo below there is an obvious issue, this is just one of the many photos. 

Screen Shot 2021-07-02 at 4.06.23 PM.png

Script Editor.zip

  • Like 1
Link to post
Share on other sites

I'd recommend submitting a support ticket with details about your concerns and any issues you're seeing, along with the output of our Mac support tool:

https://support.malwarebytes.com/hc/en-us/articles/360038519834-Upload-logs-to-your-ticket-using-the-Malwarebytes-Support-Tool-for-Mac

 
Edited by Porthos
Link to post
Share on other sites

We've started a long weekend, so staff won't be back at work until Tuesday. They were running a week or so behind before now due to the pandemic and other factors, so it might be some time before you receive a response to what @Porthos has suggested.

I'm guessing that the file you tried to update was the Script Editor app, but it's not available to us here. Perhaps this discussion can be better handled in the Newest Mac Threat forum where uploads are available to a few Malware Hunter users.

Not sure what you mean by Gateway failure, but until the most recent versions of macOS, Gateway only checks new applications the first time they are launched. Would be useful to know what macOS you are running.

Link to post
Share on other sites

42 minutes ago, Porthos said:

It seems to have been deleted by the user or staff.

Yes, the probably thought it was malicious and might possibly be.

Link to post
Share on other sites

I removed the other attachment (I didn’t realize that others would be able to open it and I don’t want to be responsible for anyone else ever going though this). All of my computers are suppose to be running 11.4, but my devices still will only NetBoot, when downloading the version is different, my sons Acer picked up Mutuodo (spyware) with MS defender. My macs though, have been a mess- My VPNS are rerouted, preinstalled apps won’t “install” because they weren’t downloaded from the App Store. After 6 months of trying to figure out how to fix this- apple still hasn’t helped at all. I reached out to Malwarebytes Customer Support- I lost access to my previous email when they were helping me, so I reached out again with a new one and it’s been about 2 weeks. I’m at a complete loss. 

4BDE2A8D-47B1-452B-8D22-1D7CFF6EA3FD.png

46DE5DD5-0411-4F06-8AAC-BCAE73706AFF.png

A83D99B1-3CC1-489A-9CFD-C081D608220A.png

17687A6A-3E87-4E83-B919-0FAF0058B6C4.jpeg

B2526547-955D-4484-8BEC-26FFAB8EA744.jpeg

B8549BB0-0693-44DA-9212-BB25D38CBB8F.png

6349ECB2-069C-4FE4-8990-345F5A388A7F.jpeg

Link to post
Share on other sites

17 hours ago, MyMacAroon said:

I removed the other attachment (I didn’t realize that others would be able to open it and I don’t want to be responsible for anyone else ever going though this).

As I mentioned earlier, you can safely upload that file to the Newest Mac Threat forum if you would like selected users and the staff to analyze it for you.

Link to post
Share on other sites

I installed Webroot, 142 threats (probably more), during its first run, seconds later (I cleared the logs) 17 more, my M1 stopped working- I went into recovery mode and got this error, I shut down and now it just tells me to contact apple support after I erased my Macintosh HD disk. Internet recovery is acting like a local recovery and everything else is “localized strings” even my Mac addresses 

 

14C4FAB0-713E-481B-99DC-D58E9A27B2CF.jpeg

1DDD11F1-B25B-4361-B418-D264225FD097.jpeg

Link to post
Share on other sites

On 7/4/2021 at 3:40 PM, MyMacAroon said:

Please see attached

Unsure why you uploaded those here and what it is you want us to see? 

As I keep saying, if you think they may be malicious you need to upload them to a different forum where normal users cannot download therm: 

https://forums.malwarebytes.com/forum/193-newest-mac-threats/

Link to post
Share on other sites

The Malwarebytes 4.10 that you uploaded yesterday is identical in size to what I get when I download it from Malwarebytes and passes all the tests for signature and hidden executables, so I have to conclude it's not been modified.

Screen Shot 2021-07-05 at 21.39.24.png

Link to post
Share on other sites

Hello, 

I uploaded 3 zips yesterday, today I uploaded the photos of Webroot finding 17 + “malicious“ files (as previously stated it was more but I cleared the logs), along with this, my M1 stating that in internet recovery mode that it couldn’t download Big Sur because I didn’t have a firmware recovery partition. 
 

I also provided screenshots of the size differences from what I was uploading vs actual file size…. 
 

Am I missing something? 

Link to post
Share on other sites

1 minute ago, MyMacAroon said:

I also provided screenshots of the size differences from what I was uploading vs actual file size….

All three downloaded files match your figures, so I wouldn't worry at all that the Forum server is displaying them as smaller files. Was there something else you need evaluated about these files?

Link to post
Share on other sites

5 minutes ago, alvarnell said:

The Malwarebytes 4.10 that you uploaded yesterday is identical in size to what I get when I download it from Malwarebytes and passes all the tests for signature and hidden executables, so I have to conclude it's not been modified.

Screen Shot 2021-07-05 at 21.39.24.png

Ours my look like the same size but I can assure you that they’re not. 

2374FC5F-F093-4D70-A692-2B003B78CED0.jpeg

5882F689-C6EE-42CA-B079-2C90AE9607D0.jpeg

88E211AF-E2DF-4567-A01F-DB8469993F85.jpeg

B41C14B9-CB5C-4E30-A4DA-CECB1F8CA035.jpeg

9190393B-660D-4CE2-9FFF-61FA19B96118.jpeg

5FA2ACFF-9399-419D-A991-F89629314B6D.jpeg

08CC8741-8606-443C-8156-CD155AC2D217.jpeg

8DFB8C04-425B-4C1E-BC07-4E7999368ACF.jpeg

9DF59B01-2CDF-4C3B-9881-162D23B8ADAF.jpeg

961900CC-73CB-47BC-9083-182101A4CED4.jpeg

8DDFCE87-E39B-4A02-9937-1829148AADE7.jpeg

6FBF8586-AE0C-4C68-A843-09C4C9CFC37D.jpeg

686DF12D-044E-4D6C-BE82-5771D1873978.jpeg

B7162853-4F16-4293-91A9-A15E94651BA0.jpeg

Link to post
Share on other sites

10 minutes ago, alvarnell said:

All three downloaded files match your figures, so I wouldn't worry at all that the Forum server is displaying them as smaller files. Was there something else you need evaluated about these files?

I guess the concern is that when I was running the support app for Malwarebytes, it stated to specifically exclude those files. 
 

When talking with apple, a lot of my files would be either removed or changed, for instance, my M1 “remoteServices.apple.com” would need to add a “configuration” fresh out of the box- Bestbuy called it a rootkit and Webroot can’t resolve some issue in /Var/path/root (I say path bc I would need to reference the photo) along with this- “Cloud” logins on my banking app, “Unix” logins on my Microsoft account, the list just goes on and on- I don’t fully open the files, I change them into “read only” and then I view them in quick look - as you can see from the photos “echo”- echo is a tool used in plain txt document by hackers for scripting- it’s an interactive/ accidental scripting by the user- all of which falls in line with what I’ve been experiencing. Like, 6 months ago, I didn’t even know that my computer had a MAC address- nor did I care. (Big mistake) 

Link to post
Share on other sites

No, it says to ignore Contacts and Calendar access, if prompted, not the files themselves. I was not prompted when I ran the script.

Can't comment on M1 configuration as I haven't purchased one yet. I would not accept any explanation from BestBuy based on previous experience. Rootkits are extremely uncommon with regard to macOS and have been made eincreaingly more so with the introduction of SIP and separate macOS volumes in Big Sur and all but impossible in Monterey.

It's way past bedtime and I can't begin to sort out what you are trying to show with all those quicklook snaps. I'll just note that "echo" is a command to display what follows to the user and the few I noted don't resemble anything malicious.

Screen Shot 2021-07-06 at 04.28.27.png

Link to post
Share on other sites

6 hours ago, MyMacAroon said:

Ours my look like the same size but I can assure you that they’re not.

Is there something in all those screenshots that attempts to prove that? Finder seems to think they are both exactly 821,852 bytes. That's yours on the left:1145904191_ScreenShot2021-07-06at04_52_39.thumb.png.ec4ed70e528420a6b7a7a5f204ec91c6.png

 

Link to post
Share on other sites

24 minutes ago, alvarnell said:

Is there something in all those screenshots that attempts to prove that? Finder seems to think they are both exactly 821,852 bytes. That's yours on the left:1145904191_ScreenShot2021-07-06at04_52_39.thumb.png.ec4ed70e528420a6b7a7a5f204ec91c6.png

 

I really appreciate you looking into that, however, that isn’t my photo on the left. The photo that I posted says 658kb on the finder tab and what I uploaded to be 642kb, mine wasn’t in military time, and that wasn’t the background of my upload. I took a screenshot of my post and attached it here. I don’t even know if any of this261F28CD-CC1C-4B52-B246-4353B6197442.thumb.png.af364fbec9627141179cfc8247a34613.png261F28CD-CC1C-4B52-B246-4353B6197442.thumb.png.af364fbec9627141179cfc8247a34613.png matters, but I do know that I there is an active, unsolicited web server. 

May I ask what you think it might be in your experience? I definitely haven’t signed up for any web servers, nor do I have any idea what it is that I should be trying to do to remove it. My old isp found a HTTP server adding a configuration to my router, and my current one found the same, without a doubt there is an issue and I don’t know what to do about it. 

Link to post
Share on other sites

5 minutes ago, MyMacAroon said:

I really appreciate you looking into that, however, that isn’t my photo on the left. The photo that I posted says 658kb on the finder tab and what I uploaded to be 642kb, mine wasn’t in military time, and that wasn’t the background of my upload. I took a screenshot of my post and attached it here. I don’t even know if any of this261F28CD-CC1C-4B52-B246-4353B6197442.thumb.png.af364fbec9627141179cfc8247a34613.png261F28CD-CC1C-4B52-B246-4353B6197442.thumb.png.af364fbec9627141179cfc8247a34613.png matters, but I do know that I there is an active, unsolicited web server. 

May I ask what you think it might be in your experience? I definitely haven’t signed up for any web servers, nor do I have any idea what it is that I should be trying to do to remove it. My old isp found a HTTP server adding a configuration to my router, and my current one found the same, without a doubt there is an issue and I don’t know what to do about it. 

This is assuming that you didn’t open up the attachment and create a new finder screenshot for the one I posted/ change your time format, and add a “?” Next to the name. Because mine was also in zip format. (It didn’t occur to me until now that is probably what your screenshot is) 😅

Link to post
Share on other sites

I am not a techy person, what I do know I learned in the past 6 months going though all this- I could send you screenshots all day of the weird things that happen, like not being able to download standard apps that are built into the OS, however I would be wasting your time. 
 

- All of my computers NetBoot

- Per the first photo I posted, I have an active web server. 
- Per Webroot, over 100+ issues, IO Reg, and wasn’t able to remove an issue in the root container. 
 

if anyone can help with telling me what they would need to determine what do, that would be awesome.

  • Like 1
Link to post
Share on other sites

  • Staff

I'm not able to follow any of this. We need to reset to zero and start from the beginning. What specific behaviors are you seeing that you believe indicate that your Mac is infected?

A few specific points:

  • The copies of Contacts and Calendar that you posted are unmodified copies of the legit versions of these apps from macOS Big Sur 11.4. I don't understand why these were posted.
  • The copy of Malwarebytes for Mac is an unmodified copy of the legit app. Again, I don't understand why this was posted.
  • The echo command is a legitimate Unix shell command.
  • The screenshots where you've highlighted things found in the script-mbst-log.txt file are normal. This file is a log of what our support tool has done, and is in no way an indication of malicious activity
  • I can't comment on anything that Webroot might have detected or removed without details, but your screenshot showed it (?) deleting .Trash and Caches, and neither of these are malicious, nor should they be deleted.
Link to post
Share on other sites

4 hours ago, treed said:

I'm not able to follow any of this. We need to reset to zero and start from the beginning. What specific behaviors are you seeing that you believe indicate that your Mac is infected?

A few specific points:

  • The copies of Contacts and Calendar that you posted are unmodified copies of the legit versions of these apps from macOS Big Sur 11.4. I don't understand why these were posted.
  • The copy of Malwarebytes for Mac is an unmodified copy of the legit app. Again, I don't understand why this was posted.
  • The echo command is a legitimate Unix shell command.
  • The screenshots where you've highlighted things found in the script-mbst-log.txt file are normal. This file is a log of what our support tool has done, and is in no way an indication of malicious activity
  • I can't comment on anything that Webroot might have detected or removed without details, but your screenshot showed it (?) deleting .Trash and Caches, and neither of these are malicious, nor should they be deleted.

Hello, 

Thank you for taking the time to respond. Honestly, for the most part I have no idea what it is that caused, or what to look for here. 
 

1.) In the first photo, I have a WINS server attached to my devices- I have attached a few screenshots from my VPN’s logs for additional reference on how my devices are communicating. 
 

2.) the logs are for the most part very standard stuff- however, Unix is used in Cpanels, and I don’t have DDNS for a domain. The Unix socket is also the same socket for my root container (root user is not enabled), I don’t have Apache, Google, Firefox etc installed on my computers. Webroot also mentioned a treat in the /Var/root/path file that it was unable to resolve. Echo is a legit command, but as I mentioned, I don’t have a Cpanel for my home, furthermore, the logs indicate that C++ is coding language, 2 group containers, a subsystem and LDAP V3 that is hidden. - the logs also mention an IOreg - almost like the built in beta has been activated without my approval. 
 

3.) Cache and cookies are temporary files, and can be deleted from time to time (to either reset your falcon cookie like I was trying to do- or just for performance Cookie signings with AWS or even WINS is a real thing.) 
 

4.) my devices are pairing with one another without prompt. My Apple TV, phones, computers, iPads and etc (all of which have different Apple ID’s) 

 

If you have any insight into what to do, or how to remove this sever, I am all ears and seriously need help, I’m losing my *****. I’ve had all of my devices wiped and or replaced, I’ve changed ISP’s, and I still can’t seem to get rid of whatever this is. 
 

 

F4B91E16-890C-484F-A593-46CF3FCBC74C.png

D9E3E81F-7807-4557-BC42-D730D68706FC.jpeg

E9635A43-D45E-4D80-9AC5-D6F1E9FCAA36.png

3E250317-11CE-4116-BF30-0E47585421BE.jpeg

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.