Hi pcventures! I hope you're feeling well.
It turns out that Microsoft has what's been called an "elegant"
solution, but (surprise!) according to this article on About.com,
they're not into sharing it yet:
http://netsecurity.about.com/b/a/146844.htm
Ah! I just discovered Microsoft's page on their "Ghostbuster":
http://research.microsoft.com/rootkit/
And they note that the SysInternals RootkitRevealer, which I
discuss further down, uses the same "elegant" solution:
"SysInternals RootkitRevealer, released on February 22, 2005,
implements the same hidden-file and hidden-Registry detection
techniques used in the Inside-the-box GhostBuster (which
includes additional hidden-process and hidden-module detection
techniques)."
http://research.microsoft.com/rootkit/#Tools
I checked out F-Secure Blacklight and the disclaimer on the
download page looked scary to me, predicting your experience:
"Notice: This is a Beta version of F-Secure BlackLight -software.
Therefore, the software may malfunction, cause your computer to
malfunction, operate erroneously and/or affect the operation of
other software in adverse manner. By downloading and using the
software you accept such risks and agree not to hold F-Secure
responsible and/or liable for your use of the software."
http://www.f-secure.com/blacklight/try.shtml
SysInternals is a software group I trust implicitly, and they're
free Rootkit Revealer is running on my system as I type this.
http://www.sysinternals.com/Utilities/RootkitRevealer.html
<Tapping foot, waiting for results>
Well it ran with no glitches or errors and found 87 discrepancies
but all of them were Temporary Internet Files, so no biggie.
Rootkit Revealer requires that it run on the system while it's
up, so that it has access to the registry hives being used.
This requirement doesn't gel with your intended methodology,
but I'm not sure there's a way for any software to work in
that way, since access to the active registry seems needed
in order to detect rootkits.
Rootkit Revealer also has a method of running which is meant
to bypass code in the rootkits designed to target rootkit
detection programs when they run:
"The reason that there is no longer a command-line version
is that malware authors have started targetting RootkitRevealer's
scan by using its executable name. We've therefore updated
RootkitRevealer to execute its scan from a randomly named
copy of itself that runs as a Windows service. This type of
execution is not conducive to a command-line interface. Note
that you can use command-line options to execute an automatic
scan with results logged to a file, which is the equivalent of
the command-line version's behavior."
Kurt Dillard of Microsoft has written a comprehensive article
about rootkits on SearchWindowsSecurity.com:
http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1086476,00.html
There are several good links on that page, one of which is
promising, but requires registration. See the link for:
"Webcast: Detailed expert advice: Detecting and removing
rootkits in Windows":
https://event.on24.com/eventRegistration/EventLobbyServlet?target=registration.jsp&align=left®width=450&totalwidth=800&eventid=12308&sessionid=1&key=1930559AA4856741B57DC798A36AD009&partnerref=siteposting&referrer=http%3A%2F%2Fsearchwindowssecurity.techtarget.com%2F&sourcepage=register
A page from that article about Detection and Removal is here:
http://searchwindowssecurity.techtarget.com/originalContent/0,289142,sid45_gci1086474,00.html
He notes on that page that, in addition to F-Secure and SysInternals,
"Microsoft has also added rootkit detection and removal to its
Microsoft Malicious Software Removal tool, which it updates monthly."
You can run a scan online or download MS' latest tool here:
http://www.microsoft.com/security/malwareremove/default.mspx
Wikipedia has a very thorough article, but, for the most part,
names the same major players. In this section of the page, it
is noted that removal may not be possible even if detection is
successful. It mentions a tool which sounds promising for the
removal process:
"There is a way to delete a rootkit using another filesystem
driver when the system is online. Rkdetector v2.0 implements
a way to wipe hidden files when the system is running using
its own NTFS and FAT32 filesystem driver. Once erased and
after a system reboot, rootkit files will not be loaded
because data contained is corrupted."
http://en.wikipedia.org/wiki/Rootkit#Removing_rootkits
You can download Rkdetector from its homepage:
http://www.rootkitdetector.com/
That should get you going! Let me know if anything's unclear.
sublime1-ga
Searches done, via Google:
detect OR eliminate rootkits
://www.google.com/search?q=detect+OR+eliminate+rootkits |