Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Paltalk & Possible Rootkit Infection


  • This topic is locked This topic is locked
10 replies to this topic

#1 crono2323

crono2323

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 23 February 2008 - 06:29 PM

Hello all, I have come across a trojan, I know which file it came from as after opening the file I noticed 2 firefox browsers running in the process list and I did not have any open. I also noticed it kept a log file of anything I typed. I had S & D's TeaTimer disabled at the time,. so I immediately enabled it and alerted me of the following: 2/21/2008 7:41:09 PM Denied (based on user decision) value "winsys.32" (new data: "C:\Documents and Settings\Me\My Documents\paltalk_muti_nick_logger.exe") added in System Startup global entry!
I am running Windows XP SP2
I disconnected from the net reboooted ran my pc in safe mode and renamed the file, restarted my pc and noticed that the loggin stopped and the double firefox's as well
I have scanned my system and even sent this file to www.virustotal.com but it shows not infected. Upon virus scanning my system with Avast it found the following: 2/22/2008 6:37:35 AM Me 2956 Sign of "Win32:Gaobot-2435 [Trj]" has been found in "C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP344\A0153664.exe" file.
I deleted this file but I don't think that was the problem. I also ran S&D Search & Destroy, Ad-aware & did not find anything, these were all full scans. I still believe I am infected possibly by a rootkit? I ran Gmer but am not familiar with it, the first time I ran it looked clean but when i opened paltalk some lines in red showed up but then gmer crashed. I have repeated the process but now shows clean. I also have a HJT log, and a Kaspersky log which did find infections. Any help would be appreciated TIA

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:42 PM

Posted 23 February 2008 - 10:57 PM

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Download and scan with Dr.Web CureIt. Follow the instructions here for performing a scan in "safe mode".
Post the log in your next reply.

Please download AVG Anti-Rootkit and save to your desktop
  • Double click avgarkt-setup-1.1.0.42.exe to begin installation.
  • Click Next to select the Normal interface.
  • Accept the license and follow the prompts to install. (By default it will install to C:\Program Files\GRISOFT\AVG Anti-Rootkit)
  • You will be asked to reboot to finish the installation so click "Finish".
  • After rebooting, double-click the icon for AVG Anti-Rootkit on your desktop.
  • You will see a window with three buttons at the bottom.
  • Click "Search For Rootkits" and the scan will begin.
  • You will see the progress bar moving from left to right. The scan will take some so be patient and let it finish.
  • When the scan has finished, if anything was found, click "Remove selected items"
  • If nothing is found, a message will appear "Congratulations! There were no installed rootkits found on your computer."
  • Click close, then select "Perform in-depth Search".
  • When the scan has finished, if anything is found, click "Remove selected items"
  • Again, if nothing was found, you will see the message "Congratulations! There were no installed rootkits found on your computer."
  • Exit AVG ARK.
Note: Close all open windows, programs, and DO NOT USE the computer while scanning. If the scan is performed while the computer is in use, false positives may appear in the scan results. This is caused by files or registry entries being deleted automatically.

Edited by quietman7, 23 February 2008 - 10:59 PM.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 crono2323

crono2323
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 24 February 2008 - 10:14 AM

Hello quietman7 & thanks for the response. I have followed your instructions & Dr. Web Cureit found the following:
RegUBP2b-Me.reg;C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Snapshots2;Trojan.StartPage.1505;Deleted.;
A0158047.reg;C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP348;Trojan.StartPage.1505;Deleted.;
A0165794.reg;C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP353;Trojan.StartPage.1505;Deleted.;
A0166020.reg;C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP353;Trojan.StartPage.1505;Deleted.;
A0166045.reg;C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP353;Trojan.StartPage.1505;Deleted.;

I have also ran AVG Anti-Rootkit & found no threats, would you by any chance know if any of the trojans found in system restore were related to the winsys.32 Tea timer detected in my post?

Edited by crono2323, 24 February 2008 - 10:15 AM.


#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:42 PM

Posted 24 February 2008 - 11:12 AM

...would you by any chance now if any of the trojans found in system restore were related to the winsys.32 Tea timer detected in my post?

Hard to tell. Vendors do not use universal definitions for malware. Further, files found in the SIV folder for system restore are named with RP***\A00*****.

However, in your first post, Spybot's detection of winsys.32 points to the paltalk file and the Win32:Gaobot-2435 detection points to a restore point. Dr.Web detected Trojan.StartPage.1505 in Spybot's Snapshots2 folder as well as in your SIV folder.

Did you do a physical search for the winsys.32 file? Use Windows Search feature > More advanced options to see if the file(s) are still present. To do this, go to Start -> Search and click For Files or Folders... or just press the Windows key + F key on the keyboard.
  • Click All files and folders.
  • Type in the name of the file under "Search by...criteria."
  • Click More advanced options and check these options:
    • "Search system folders"
    • "Search hidden files and folders"
    • "Search subfolders"
  • Then click "Search" to look for the file(s).

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 crono2323

crono2323
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 24 February 2008 - 03:17 PM

I have searched for winsys.32 on my pc and all it found were winsys.cab 79KB and winsys32.cab 34KB both are located in C:\i386 folder with a creation date in 2004, could be unrelated as this comp is only 2 years old.

#6 crono2323

crono2323
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 26 February 2008 - 05:32 PM

I have searched for winsys.32 on my pc and all it found were winsys.cab 79KB and winsys32.cab 34KB both are located in C:\i386 folder with a creation date in 2004, could be unrelated as this comp is only 2 years old.


Is there anything else i can do? Shall I post a HJT log? and if so should i post it here or in the HJT forum with a link to my topic? TIA

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:42 PM

Posted 27 February 2008 - 08:01 AM

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". You may have performed some of these steps already. If you can't perform a step, then skip and continue with the next. In step #9 there are instructions for downloading HijackThis and creating a log. (This is a self-extracting version which will automatically install the current version of HJT in the proper location.) If using Windows Vista, be sure to Run As Administrator.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 crono2323

crono2323
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 27 February 2008 - 08:24 PM

thank you quietman7, I will do that. You have been very helpful :thumbsup:

#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:42 PM

Posted 28 February 2008 - 10:24 AM

Your welcome and good luck.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 crono2323

crono2323
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:42 PM

Posted 06 March 2008 - 05:05 PM

Here is some additional info if it helps for the person who will handle my HJT log, the paltalk file was infected with W32/Backdoor2.GZV according to virustotal.com & F-prot

#11 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:42 PM

Posted 07 March 2008 - 08:54 AM

Your hijackthis log is posted here.

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean. When someone replies, please advise them at that time of any new information in regards to what you found.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

To avoid confusion, I am closing this topic until you are cleared by the HJT Team. If you still need assistance after your log has been reviewed and you have been cleared, please PM me or another moderator and we will re-open this topic.

Thanks for your cooperation and good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users