I think I have a Possible Rootkit on an outboard seagate backup plus drive I just acquired, Help?

pneuma1985

Level 4
Thread author
Verified
Aug 30, 2015
189
I recently obtained a new outboard drive off a friend for 10$ lol good deal right...Well I plug her in and format it no problem also note I plugged it into a VM not my host machine to format it completely using Easus Partition Master. It seems as though something got through and that would be a rootkit, but I'm not sure so here are the logs. I should have DBAN'D the drive but instead I figured it would take to long given the size of the drive. So I decided not to zero write the drive out. I really need help if it is a rootkit or is this just HMPA throwing a false positive somehow. I'm not exactly sure how HMPA exploit mitigation works whether it embeds itself into the kernel or what. So if I am kitted I need help removing it. Drive L is the suspected drive that is kitted but I definitely need help on the steps to take to get rid of the rootkit if it is kitted. Thanks for any response. And
 

Attachments

  • FRST.txt
    253.8 KB · Views: 1
  • Addition.txt
    36.4 KB · Views: 2
  • aswMBR-C-Drive.txt
    2.2 KB · Views: 1
  • aswMBR-H.txt
    2.6 KB · Views: 1
  • aswMBR-I.txt
    742 bytes · Views: 0
  • aswMBR-J.txt
    742 bytes · Views: 0
  • aswMBR-K.txt
    742 bytes · Views: 1
  • aswMBR-L.txt
    24.7 KB · Views: 0
  • AdwCleaner[C0].txt
    1.4 KB · Views: 0

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top