Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Exploit.realplay.e And Trojandownloader.psyme.ls


  • Please log in to reply
1 reply to this topic

#1 Arkan

Arkan

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 20 March 2008 - 10:10 AM

Hello fellows!

First of all, thanks for your help. I'll try and provide you all the information I have:

Eset NOD32 antivirus detected and quarantined the following (as I can see, exploit.realplay.e and trojandownloader.psyme.LS were found during a hidden connection to the site mentioned below):

20.03.2008 15:22:48 Real-time file system protection file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\ZF7ZI2P7\r[1].htm JS/Exploit.RealPlay.E trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE.
20.03.2008 15:22:46 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 15:22:46 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 15:11:38 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator Threat was detected upon access to web by the application: C:\Program Files\Mozilla Firefox\firefox.exe.
20.03.2008 15:11:37 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator Threat was detected upon access to web by the application: C:\Program Files\Mozilla Firefox\firefox.exe.
20.03.2008 15:01:10 Real-time file system protection file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\7K6TXJJ4\r[1].htm JS/Exploit.RealPlay.E trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe.
20.03.2008 15:01:03 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 15:00:57 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 15:00:57 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:52:08 Real-time file system protection file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\68H5DR0S\r[1].htm JS/Exploit.RealPlay.E trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe.
20.03.2008 14:52:08 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:52:07 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:52:05 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:52:05 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:43:31 Real-time file system protection file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\ZF7ZI2P7\r[1].htm JS/Exploit.RealPlay.E trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe.
20.03.2008 14:43:31 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:43:30 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:41:58 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:41:56 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:41:53 Real-time file system protection file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\0A48B52W\r[1].htm JS/Exploit.RealPlay.E trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe.
20.03.2008 14:41:51 HTTP filter file hxxttp://791224.com/06014.htm VBS/TrojanDownloader.Psyme.LS trojan connection terminated - quarantined HOME-1234567891\Administrator
20.03.2008 14:41:51 HTTP filter file hxxttp://791224.com/r.htm JS/Exploit.RealPlay.E trojan connection terminated - quarantined HOME-1234567891\Administrator



The first thing I did was to remove RealPlayer, but it didn't help, so here is the hijackthis log


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:54:39, on 20.03.2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Winamp\winampa.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\WINDOWS\VM303_STI.EXE
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Last.fm\LastFMHelper.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.daemon-search.com/startpage
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\winampa.exe"
O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [BigDog303] C:\WINDOWS\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
O4 - Startup: Last.fm Helper.lnk = C:\Program Files\Last.fm\LastFMHelper.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O12 - Plugin for .UVR: C:\Program Files\Internet Explorer\Plugins\NPUPano.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

--
End of file - 6039 bytes


Thanks again for helping! Please reply ASAP and feel free to request any aditional information you need.

Edited by KoanYorel, 20 March 2008 - 10:29 AM.
To disable hot link URLs above


BC AdBot (Login to Remove)

 


#2 -David-

-David-

  • Members
  • 10,603 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London
  • Local time:04:45 AM

Posted 07 April 2008 - 02:52 PM

Sorry for the delay. If you are still having problems please post a brand new HijackThis log as a reply to this topic. Before posting the log, please make sure you follow all the steps found in this topic:

Preparation Guide For Use Before Posting A Hijackthis Log

Please also post the problems you are having.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users