Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Udp Packets Port 6646


  • Please log in to reply
14 replies to this topic

#1 pasha19

pasha19

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 23 December 2007 - 02:18 PM

Tecra 8000 Winxp SP2 Fully patched running Avast AV
Scanned clean with Trend Micro, Panda, BitDefender and Avast

Trend Micro Cleaned out an Adware - memorytracker in the process

Tends to send alot of packets during the day intermittently

Have wireshark running from another machine

The packets are UDP packets from/to port 6646 from addr 123 on my subnet to addr 255.

they are about 1300 byte packets

Any idea what this is?

Help Please

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:10:25 PM

Posted 23 December 2007 - 03:24 PM

This topic has been reopened. The member has a current HJT log, but this isn't the same computer.

Sorry for the inconvenience,
rigel

Edited by rigel, 23 December 2007 - 09:17 PM.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 27 December 2007 - 12:50 PM

This machine in scanning has located several pieces of malware -- a reoccuring version of adware - memwatcher -- detected and cleaned repeatedly by trend micro housecall.

In addition an avast boort time scan detected and placed win32.CTX in the virus chest.

I extracted said file and submitted it to VirusTotal with the following results
Antivirus Version Last Update Result
AhnLab-V3 - - -
AntiVir - - Frisk #2
Authentium - - -
Avast - - Win32:CTX
AVG - - -
BitDefender - - -
CAT-QuickHeal - - -
ClamAV - - Sirius.Annihilator.272
DrWeb - - -
eSafe - - -
eTrust-Vet - - -
Ewido - - -
FileAdvisor - - -
Fortinet - - -
F-Prot - - -
F-Secure - - -
Ikarus - - Virus.Win32.CTX
Kaspersky - - -
McAfee - - -
Microsoft - - -
NOD32v2 - - -
Norman - - -
Panda - - -
Prevx1 - - -
Rising - - -
Sophos - - W95/Sledge-A
Sunbelt - - -
Symantec - - -
TheHacker - - -
VBA32 - - -
VirusBuster - - -
Webwasher-Gateway - - Win32.Bumble
Additional information
MD5: a2f5b88c448f2258495dfaea9bdb16e5


The port 6646 transmissions have not been observed in the last couple of days. But like another machine the adware - memwatcher item is a re-occuring problem.

#4 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 28 December 2007 - 03:50 PM

another piece of malware reported by Netcom3 -- Mirar Still attempting to clean.

#5 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 28 December 2007 - 04:03 PM

another piece of malware reported by Netcom3 -- Mirar Still attempting to clean.

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:25 PM

Posted 28 December 2007 - 04:32 PM

avast! will falsely detect Panda ActiveScan files as Win32:CTX, Win32:Kuang2 worm/virus. This has been a known problem dating back to early 2005. You need to disable avast while scanning with Panda because Panda uses unencrypted virus definitions which avast! detects as the real virus.

Q: Viruses have been detected in some of the 'Panda Antivirus' files on my computer (Win95:Matyas and Win32:Kuang2 in PAV.SIG mainly). Why is this?
A: This is a known problem. Letīs try to explain whatīs going on...

Every virus can be identified, because it contains some unique signatures. Antiviral programs have their own database of that signatures. We call this database the "virus definition file".
When an antiviral program scans a file for viruses, it compares all the signatures (of all viruses) in the database with the signatures in that file. If the signatures match (they are the same), the file is marked as infected. For an antivirus program, it is important to hide this database of signatures somehow - e.g. by encrypting it. Panda Antivirus does not encrypt its virus database - the signatures inside are clearly "visible" to other antiviral programs, so they detect this file as infected (but there is actually no virus inside - only the signatures are the same).

avast detects ActiveScan as virus
avast detects Win32:CTX worm/virus when using Panda ActiveScan

The problem is that Panda still ships files that contain "plain viruscode", other vendors encrypt such files to avoid such false positives. So Clam is right somehow, it found the bytesequence of the virus in the file.

ClamAV Mailing List Archive

Please download ATF Cleaner by Atribune & save it to your desktop. DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 29 December 2007 - 12:25 PM

1) Performed scan as indicated step by step.
--- found and quarantined nothing.

RE: False Panda detection -- went through that earlier
file name was clearly in Panda directory as a result I redid all scans assuring I removed the completed online scanner before the next test. This is part of the reason it took so long to complete the steps and file the valid HJT on the other machine. I will provide exact file name after an Antivir scan I am running now. When i extracted it to send it to virus total it got loose and infected another file. I will provide the second file name too. They were both in different of those unique named alphanumeric soup hyphenated directories (I know these are used by windows for special things -- I have never had a need to figure out what to date).

The test generating the Win32:CTX detection was without panda installed and the panda directory was deleted.

Question does the linux install package for amavisd contain similar unpacked virus signatures that could be falsely detected by Norton? Linux installer files were removed from other machine to avoid another probable false positive to confuse people here with. Yes, I had a linux installer DVD (SuSE 10.0) on a windows box in a shared folder using SMB to install linux on other machines (neither of the two we have discussed to date).

#8 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 29 December 2007 - 02:58 PM

the files quarantined by avast as Win32:CTX were:

C:\System Volume Information\_restore{046E41D3-E07E-4A46-8CC7-528E57F1860F}\RP236\A0106485.dll
and
C:\System Volume Information\_restore{046E41D3-E07E-4A46-8CC7-528E57F1860F}\RP265\A0111858.dll

last date changed respectively 8/18/2006 and 12/27/2007

#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:25 PM

Posted 29 December 2007 - 03:30 PM

The infected RP***\A0**** file(s) quarantined by avast were in the System Volume Information Folder (SVI) which is a part of System Restore. This is the feature that allows you to set points in time to roll back your computer to a clean working state. The SIV folder is protected by permissions that only allow the system to have access and is hidden by default unless you have reconfigured Windows to show it.

System Restore will back up the good as well as the bad files so when malware is present on the system it gets included in any restore points. When you scan your system with anti-virus or anti-malware tools, you may receive an alert or notification that a virus was found in the System Volume Information folder (System Restore points) but the anti-virus software was unable to remove it. Since the System Volume Information folder is a protected directory, most scanning tools cannot access it to disinfect or delete these files. If not removed, they sometimes can reinfect your system if you accidentally use an old restore point.

Create a New Restore Point to enable your computer to "roll-back" to a clean working state and use Disk Cleanup to remove all but the most recent restore point.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 29 December 2007 - 04:20 PM

Quietman7 -- per your instructions the restore point was taken and all but the last restore point was deleted

To keep the thread up to date I still have a pending Mirar issue.

#11 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:25 PM

Posted 29 December 2007 - 04:34 PM

Reboot your computer in "Safe Mode" using the F8 method.

Search for and delete the following file(s)/folder(s) in bold if they are present. You can use Windows Explorer to navigate to or use Windows Search feature > More advanced options to locate them.

Files:
875455-NOSB.exe
MirarSetup.exe
mirarsearch_toolbar.exe
C:\WINDOWS\System32\NN_BAR.DLL <- this file
C:\WINDOWS\System32\NN_Bar21.dll <- this file
C:\WINDOWS\System32\NN_Bar22.dll <- this file
C:\WINDOWS\System32\NN_Bar31.dll <- this file
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#12 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 30 December 2007 - 12:15 AM

Searched out all files mentioned found none -- this is my omission, I should have identified the mirar that was detected was a registry entry.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com

value *=dword 0x00000004 (4)

Another site (spybot) indicates this may be a false positive on a spybot immunization.

Do you concur?

#13 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:25 PM

Posted 30 December 2007 - 01:06 AM

Yes most likely a false positive. Spybot's immunization feature is similar to Spywareblaster in that it adds sites to the restricted zones by adding the domain as a subkey under the registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#14 pasha19

pasha19
  • Topic Starter

  • Members
  • 202 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Michigan
  • Local time:10:25 PM

Posted 31 December 2007 - 01:46 PM

Submitted HJT log and froze changes to machine primaril.y for comparison to other machine with problems -- please close this -- thanks to all

#15 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:25 PM

Posted 31 December 2007 - 01:56 PM

Your hijackthis log is posted here.

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

To avoid confusion, I am closing this topic until you are cleared by the HJT Team. If you still need assistance after your log has been reviewed and you have been cleared, please PM me or another moderator and we will re-open this topic.

Thanks for your cooperation and good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users