Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Mustafx


  • Please log in to reply
6 replies to this topic

#1 Ferretz

Ferretz

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 11 January 2008 - 10:26 AM

We have been infected by a nasty lil bugger.

It creates 6 files every time we reboot ..

C:\windows\mustafx.exe
C:\windows\mustafx2.exe
C:\windows\murka.dat


C:\windows\system32\mustafx.exe
C:\windows\system32\mustafx2.exe
C:\windows\system32\murka.dat

We have tried to run HyjackThis but it is terminated every time we start it.

any suggestions on what to do now would be great..

BC AdBot (Login to Remove)

 


#2 JDM2

JDM2

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:11:43 AM

Posted 11 January 2008 - 10:43 AM

What version of HJT are you running? If it's a version lower than 2, try renaming the exe to something like geek. Then try running again. Also, if it's a version lower than 2, try running it from C:/HiJackThis (you may have to create a new folder for it) instead of directly from the desktop. That may trick it.

PS: I have the feeling an expert here is going to recommend you download and run either SDFix or ComboFix + FixWareout eventually but that's for them to decide.

In the meantime, you could download AntiVir and see if it will allow you to scan:

http://www.antivir-pe.com/freet/index.php?...ain=free-av.com

EDIT: These people appear to have a similar problem:

http://www.techsupportforum.com/security-c...ustafx-exe.html

http://www.malwareremoval.com/forum/viewto...=11&t=26758

Neither case appears to be resolved as of yet.

Edited by JDM2, 11 January 2008 - 10:59 AM.


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:43 PM

Posted 11 January 2008 - 03:40 PM

Please download SDFix by AndyManchesta and save it to your desktop.
alternate zipped version
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Double click SDFix.exe and it will extract the files to %systemdrive%
  • (this is the drive that contains the Windows Directory, typically C:\SDFix).
  • DO NOT use it just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Open the SDFix folder and double click RunThis.bat to start the script.
  • Type Y to begin the cleanup process.
  • It will remove any Trojan Services or Registry Entries found then prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • When the PC restarts, the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
  • Once the desktop icons load, the SDFix report will open on screen and also save a copy into the SDFix folder as Report.txt.
  • Copy and paste the contents of Report.txt in your next reply.
-- If this error message is displayed when running SDFix: "The command prompt has been disabled by your administrator. Press any key to continue..."
Please go to Start Menu > Run > and copy/paste the following line:
%systemdrive%\SDFix\apps\swreg IMPORT %systemdrive%\SDFix\apps\Enable_Command_Prompt.reg
Press Ok and then run SDFix again.

-- If the Command Prompt window flashes on then off again on XP or Win 2000, please go to Start Menu > Run > and copy/paste the following line:
%systemdrive%\SDFix\apps\FixPath.exe /Q
Reboot and then run SDFix again.

-- If SDFix still does not run, check the %comspec% variable. Right-click My Computer > click Properties > Advanced > Environment Variables and check that the ComSpec variable points to cmd.exe.
%SystemRoot%\system32\cmd.exe

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 Ferretz

Ferretz
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 11 January 2008 - 07:30 PM

SD fix report:


SDFix: Version 1.125

Run by Beverly on Fri 01/11/2008 at 04:05 PM

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\DOCUME~1\Beverly\Desktop\SDFix

Safe Mode:
Checking Services:


Infected beep.sys Found!

beep.sys File Locations:

"C:\WINDOWS\system32\drivers\beep.sys" 38912 01/09/2008 02:25 PM

Infected File Listed Below:

C:\WINDOWS\system32\drivers\beep.sys

Trojan File copied to Backups Folder
Attempting to replace beep.sys with original version...


Original beep.sys Restored

"C:\WINDOWS\system32\dllcache\beep.sys" 4224 01/10/2008 05:51 AM
"C:\WINDOWS\system32\drivers\beep.sys" 4224 01/10/2008 05:51 AM



Restoring Windows Registry Values
Restoring Windows Default Hosts File
Resetting AppInit_DLLs value


Rebooting...


Normal Mode:
Checking Files:

Trojan Files Found:

C:\WINDOWS\mustafx.exe - Deleted
C:\WINDOWS\mustafx2.exe - Deleted
C:\WINDOWS\system32\murka.dat - Deleted
C:\WINDOWS\system32\mustafx.exe - Deleted
C:\WINDOWS\system32\mustafx2.exe - Deleted



The files below have been patched by Trojan.Agent.zb to load users32.dat and should be replaced:

C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe



Removing Temp Files...

ADS Check:

C:\WINDOWS
No streams found.

C:\WINDOWS\system32
No streams found.

C:\WINDOWS\system32\svchost.exe
No streams found.

C:\WINDOWS\system32\ntoskrnl.exe
No streams found.



Final Check:

catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-11 16:16:28
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services:
------------------



Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\IncrediMail\\bin\\IMApp.exe"="C:\\Program Files\\IncrediMail\\bin\\IMApp.exe:*:Enabled:IncrediMail"
"C:\\Program Files\\IncrediMail\\bin\\IncMail.exe"="C:\\Program Files\\IncrediMail\\bin\\IncMail.exe:*:Enabled:IncrediMail"
"C:\\Program Files\\IncrediMail\\bin\\ImpCnt.exe"="C:\\Program Files\\IncrediMail\\bin\\ImpCnt.exe:*:Enabled:IncrediMail"
"C:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"="C:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe:*:Enabled:EasyShare"
"C:\\Program Files\\Kazaa\\kazaa.exe"="C:\\Program Files\\Kazaa\\kazaa.exe:*:Enabled:Kazaa"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Java\\jre1.5.0_09\\bin\\javaw.exe"="C:\\Program Files\\Java\\jre1.5.0_09\\bin\\javaw.exe:*:Enabled:Java™ 2 Platform Standard Edition binary"
"C:\\Program Files\\ICQLite\\ICQLite.exe"="C:\\Program Files\\ICQLite\\ICQLite.exe:*:Enabled:ICQ Lite"
"C:\\My Downloads\\Sims Stuff\\incredimail_install.exe"="C:\\My Downloads\\Sims Stuff\\incredimail_install.exe:*:Enabled:IncrediMail Installer"
"C:\\Program Files\\iTunes\\iTunes.exe"="C:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

Remaining Files:
---------------

File Backups: - C:\DOCUME~1\Beverly\Desktop\SDFix\backups\backups.zip

Files with Hidden Attributes:

Wed 13 Oct 2004 1,694,208 ..SH. --- "C:\Program Files\Messenger\msmsgs.exe"
Tue 3 Aug 2004 60,416 A.SH. --- "C:\Program Files\Outlook Express\msimn.exe"
Thu 10 Jan 2008 0 A..HR --- "C:\RECYCLER\S-1-5-21-2052111302-796845957-682003330-1003\Dc1.exe"
Thu 10 Jan 2008 0 A..HR --- "C:\RECYCLER\S-1-5-21-2052111302-796845957-682003330-1003\Dc2.exe"
Sat 21 Sep 2002 10,752 A..H. --- "C:\26799f6b247e4a7314fd3df1f57ed711\sp1\update\spcustom.dll"
Sat 21 Sep 2002 273,408 A..H. --- "C:\26799f6b247e4a7314fd3df1f57ed711\sp1\update\update.exe"
Sat 21 Sep 2002 10,752 A..H. --- "C:\3daefb73884120d96c9c3d975365\sp1\update\spcustom.dll"
Sat 21 Sep 2002 273,408 A..H. --- "C:\3daefb73884120d96c9c3d975365\sp1\update\update.exe"
Sat 21 Sep 2002 10,752 A..H. --- "C:\574c1f118943b8178e8342a2c64\sp1\update\spcustom.dll"
Sat 21 Sep 2002 273,408 A..H. --- "C:\574c1f118943b8178e8342a2c64\sp1\update\update.exe"
Thu 17 May 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Tue 8 Apr 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL0982.tmp"
Mon 31 Mar 2003 22,528 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL1663.tmp"
Mon 31 Mar 2003 23,552 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL2192.tmp"
Mon 31 Mar 2003 24,064 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL2247.tmp"
Mon 31 Mar 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL2514.tmp"
Mon 31 Mar 2003 22,528 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL2648.tmp"
Mon 31 Mar 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL2762.tmp"
Mon 31 Mar 2003 25,088 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL3792.tmp"
Mon 31 Mar 2003 23,552 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL3939.tmp"
Mon 31 Mar 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\~WRL3984.tmp"
Thu 8 Aug 2002 31,232 A..H. --- "C:\Personal Files\Beverly\Work Files\Veees\~WRL3604.tmp"
Mon 4 Aug 2003 21,504 A..H. --- "C:\Personal Files\Beverly\Work Files\Village Hope\~WRL0813.tmp"
Mon 4 Aug 2003 42,496 A..H. --- "C:\Personal Files\Beverly\Work Files\Village Hope\~WRL1515.tmp"
Mon 4 Aug 2003 39,424 A..H. --- "C:\Personal Files\Beverly\Work Files\Village Hope\~WRL2315.tmp"
Mon 4 Aug 2003 21,504 A..H. --- "C:\Personal Files\Beverly\Work Files\Village Hope\~WRL3881.tmp"
Wed 8 Aug 2007 400 A..H. --- "C:\Program Files\Common Files\Symantec Shared\COH\COH32LU.reg"
Wed 8 Aug 2007 403 A..H. --- "C:\Program Files\Common Files\Symantec Shared\COH\COHDLU.reg"
Sun 30 Mar 2003 22,016 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\Testimonials\~WRL0378.tmp"
Tue 12 Aug 2003 22,528 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\Testimonials\~WRL0766.tmp"
Tue 12 Aug 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Portfolio Pieces\Testimonials\~WRL3120.tmp"
Tue 12 Aug 2003 20,992 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL0373.tmp"
Tue 12 Aug 2003 19,456 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL0518.tmp"
Wed 30 Jul 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL0849.tmp"
Wed 4 Jun 2003 23,552 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL1077.tmp"
Thu 17 Jul 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL1078.tmp"
Thu 17 Jul 2003 22,016 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL1528.tmp"
Tue 12 Aug 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL1789.tmp"
Tue 12 Aug 2003 20,480 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL1872.tmp"
Thu 17 Jul 2003 22,528 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL2106.tmp"
Wed 30 Jul 2003 24,064 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL2161.tmp"
Thu 17 Jul 2003 24,576 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL2316.tmp"
Tue 12 Aug 2003 20,992 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL2799.tmp"
Tue 12 Aug 2003 24,064 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL2891.tmp"
Thu 17 Jul 2003 24,064 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL3287.tmp"
Thu 17 Jul 2003 23,552 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL3368.tmp"
Tue 12 Aug 2003 20,480 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL4061.tmp"
Wed 4 Jun 2003 23,040 A..H. --- "C:\Personal Files\Beverly\Marketing Stuff\Resumes & Coverletters\Jobs\~WRL4080.tmp"
Fri 28 Mar 2003 2,498,048 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Crwr 401\~WRL0911.tmp"
Fri 28 Mar 2003 2,492,928 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Crwr 401\~WRL1610.tmp"
Fri 28 Mar 2003 2,809,344 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Crwr 401\~WRL1859.tmp"
Fri 28 Mar 2003 2,797,568 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Crwr 401\~WRL2112.tmp"
Fri 28 Mar 2003 2,909,184 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Crwr 401\~WRL3370.tmp"
Sun 23 Mar 2003 36,352 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL0346.tmp"
Sun 23 Mar 2003 35,328 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL0889.tmp"
Sun 23 Mar 2003 36,352 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL0890.tmp"
Sun 23 Mar 2003 35,328 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL2689.tmp"
Sun 23 Mar 2003 35,328 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL2806.tmp"
Sun 23 Mar 2003 34,816 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL3000.tmp"
Sun 23 Mar 2003 34,816 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL3406.tmp"
Tue 11 Mar 2003 31,744 A..H. --- "C:\Personal Files\Beverly\School\6 - Winter 2003\Prfu 340\Website Project Stuff\~WRL4082.tmp"

Finished!

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:43 PM

Posted 11 January 2008 - 09:19 PM

The files below have been patched by Trojan.Agent.zb to load users32.dat and should be replaced:

C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe


Unfortunately, these patches cannot be easily repaired so you will need to reinstall the programs.

IMPORTANT NOTE: One or more of the identified infections was a backdoor Trojan. Backdoor Trojans, IRCBots and Infostealers are very dangerous because they provide a means of accessing a computer system that bypasses security mechanisms and steal sensitive information like passwords, personal and financial data which they send back to the hacker. Remote attackers use backdoor Trojans as part of an exploit to to gain unauthorized access to a computer and take control of it without your knowledge. Read the Danger: Remote Access Trojans.

If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach.

Although the backdoor Trojan was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the backdoor Trojan has been removed the computer is now secure. Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat and reinstall the OS. Please read "When should I re-format?".
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 Ferretz

Ferretz
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:43 AM

Posted 12 January 2008 - 12:42 PM

Well, unfortunately we're going to follow your advice and just re-install everything.

Thank you for your time and your help with this matter! It's great that people like you give so freely of their time to help others in need.

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:43 PM

Posted 12 January 2008 - 12:49 PM

That's the decision I would have made if this were my system.

Some types of malware can result in a system so badly damaged that a Repair Install will NOT help!. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Starting over, reformatting the drive and performing a clean install of the OS removes everything and is the safest action.

In case you need help with this, please review the following links:
"How to partition and format a hard disk in Windows XP"
"How do I reinstall and reformat Windows XP on my hard drive?"

These links include step by step instructions:
"Reformat & Clean Install Windows".
"XP Clean Install Interactive Setup".
"Clean Install Windows XP".
"Clean Install Procedure with Illustrative Screen Captures".

Also see "How to keep your Windows XP activation after clean install".

If you need additional assistance, you can start a new topic in the Windows XP Home and Professional forum.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users