Five steps to help you clear the kernel-level Trojan program Byshell

Source: Internet
Author: User
Tags ssdt

Byshell is an independent function that allows you to remotely control backdoors without processes, DLL, and startup items. It integrates multiple Rootkit technical features ). It uses threads to inject DLL to system processes, unmaps the DLL, deletes its own files and startup items, and recovers when it is shut down. It is a kernel-level Trojan program, mainly working in Ring0, so it is highly concealed and lethal.
Hackers usually use Byshell Trojans to remotely control the machines installed with the WindowsNT/2000/XP/2003 operating system. When Byshell is installed on a remote computer, hackers have full control over the machine, it will not be manually detected by software and administrators such as antivirus and firewall installed on the controlled machine.

How to bypass active defense

Byshell uses Rootkit Technology to bypass strict firewall or Border Router Access control. It can be easily connected to the control end of the Internet, regardless of the Intranet or Internet. The connections established by this technology will also be hidden, and the connections used by the backdoor cannot be seen on any machine installed with this backdoor program.

At the same time, it does not have its own independent process, nor does it appear in the task manager or a vast majority of third-party process management tools. You can use a hidden iexplore.exe to connect to the Internet. You can bypass the Firewall Application to access the network address. The startup Item created by it cannot be found in the registry, and there is no RUN key value, avoiding being detected by programs such as Msconfig. ByShell Trojan searches the SSDT table of the current system, then searches the SSDT table used by the system, and then overwrites the current SSDT table with the previous one. The trojan program can be executed in the normal order, so that the active defense function is permanently ineffective.

Clear Byshell in five steps

1. Install a security tool software with the process management function. Check the system process and you will see many processes marked. These processes are suspicious, and some processes may have been implanted with Trojans. Click the IE browser process and find a suspicious Trojan module hack. dll.

2. Find out the service management-related options in the security tool software. You can also see multiple clearly identified system services, indicating that these services are not the system's own services. A service named Hack is suspicious because it has the same name as the trojan module.

3. find the labels related to file management in the tool software. In the simulated Resource Manager window, according to the path guidance of the suspicious module, the suspicious Trojan module File hack was quickly found. dll. At the same time, an executable file with the same name as the module File is also found. It seems that this trojan is mainly composed of these two files.

4. Now we will start to clear Trojans. In the process management option, first find the clearly identified IE browser process, select it, and clear it by right-clicking the "End this process" command. Click "Service Management", select a service named "Hack", and right-click the "delete selected service" command in the menu to delete the service. Then, select the file management option in the program to clear the trojan file. Find the hack.dlland hack.exe files in the system32directory of the system, right-click the "delete file directly" command in the menu to complete the last blow to the Trojan. Restart the system and check whether the trojan is cleared.

5. Because the Trojan Program destroys the content of anti-virus software in the SSDT table, you are advised to use the active repair function provided by the software to fix the problem, or reinstall the anti-virus software once.

Before Trojans were planted, the most important task for hackers was to perform the kill-free operation, so that they could bypass anti-virus software pattern detection. Nowadays, ByShell already has Trojans that can break through active defense. In the future, there will be more and more such Trojans. Therefore, we must strengthen our security awareness.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.