goombawaho
MIS
Customer's Windows 7 machine would not boot. All data on windows partition was gone when I got there (as determined by booting to a BartPE CD), yet the HP Recovery Partition data was unmolested. Hard drive tested out fine using manufacturer's test. Trying to figure out what happened to all the files.
When I put the hard drive in my "recovery computer" to run GetDataBack on it, Microsoft Security Essentials found the following:
DOS/Alureon.A
Items:
boot:\Device\Harddisk1\DR1
boot:\Device\Harddisk1\DR1\(MBR)
When I recovered some of the data off the drive, M.S.E. found:
Win32/Alureon.DX
Second detection when restoring files from slave drive:
containerfile:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\2c79c3d9-4c15dc39
containerfile:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\48e5885e-22359887
file:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\2c79c3d9-4c15dc39->[Obfuscator.PN]
file:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\48e5885e-22359887->[Obfuscator.PN]
Does it make sense that the malware removed all the files by itself? Or did it happen in conjunction with Kaspersky fighting the malware? The drive's partition for C: was still there. I don't know what to tell the customer as the root cause. Strange that the recovery partition still had files in it but the C: drive would be totally zapped.
When I put the hard drive in my "recovery computer" to run GetDataBack on it, Microsoft Security Essentials found the following:
DOS/Alureon.A
Items:
boot:\Device\Harddisk1\DR1
boot:\Device\Harddisk1\DR1\(MBR)
When I recovered some of the data off the drive, M.S.E. found:
Win32/Alureon.DX
Second detection when restoring files from slave drive:
containerfile:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\2c79c3d9-4c15dc39
containerfile:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\48e5885e-22359887
file:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\2c79c3d9-4c15dc39->[Obfuscator.PN]
file:C:\Documents and Settings\JLD\Desktop\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\48e5885e-22359887->[Obfuscator.PN]
Does it make sense that the malware removed all the files by itself? Or did it happen in conjunction with Kaspersky fighting the malware? The drive's partition for C: was still there. I don't know what to tell the customer as the root cause. Strange that the recovery partition still had files in it but the C: drive would be totally zapped.