Endpoint Protection

 View Only
  • 1.  New VMProxy.sys rootkit not found by AV software? Trojan.Gen.2

    Posted Aug 25, 2011 04:42 PM

    We've had a couple of instances of Windows servers harboring something called VMProxy.sys. I can't find anything on it in Google other than a reference on Twitter and what look to be mostly Chinese web sites. We have a meeting on how to look for this tomorrow morning and I don't know much more about it, but am trying to gather information.

     

    Update with the malware name in the title.



  • 2.  RE: New VMProxy.sys rootkit not found by AV software? Trojan.Gen.2

    Trusted Advisor
    Posted Aug 26, 2011 01:54 PM

    Hello,

    Please Work on this Article to submit the Suspicious files:

     

    Symantec Support Tool: How to collect suspicious files and submit the samples to the Symantec Security Response Team.
     
     
    How to submit files to the Threat Expert website.
     
     
    Hope this helps!!


  • 3.  RE: New VMProxy.sys rootkit not found by AV software? Trojan.Gen.2

    Posted Aug 31, 2011 01:27 AM

    We've also experience VMProxy.sys on two servers of which one blue-screened this morning.  We had uploaded information to Symantec and had an incident open most of the day only to discover after an 102 minutes on the phone that it was determined to be non-malicious.  I have not been able to interpret the many Asian blogs on this topic yet, but I suspect there is more here than realized.



  • 4.  RE: New VMProxy.sys rootkit not found by AV software? Trojan.Gen.2

    Posted Aug 31, 2011 09:08 AM

    It had actually been hiding in our environment since late May. Nothing caught it. When we submitted files to Microsoft and Symantec, they added the fingerprints to their Safety Scanner and definitions, respectively. We have since found it in about 8 devices out of around 750.

    Symantec identifies it as Trojan.Gen.2 and it usually shows up in the c:\windows\system32\spoolv.exe file, which is not a valid file. SpoolSv.exe is a valid file. The Microsoft Safety Scanner identfies it as Mangzamel.A. If you run that tool, it can take 5 or more hours depending on the number of files on the system.

    Before we had a successful way to scan a host, we were able to see outbound network activity bound for IP 202.172.40.232 in Singapore.