Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan Vundo


  • Please log in to reply
16 replies to this topic

#1 vsvs

vsvs

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 11 July 2008 - 05:45 AM

Hi BC,
I recently found the Vundo trojan on my computer, read some posts here and downloaded MBAM, tried many antiviruses and Trend Micro's online scan
If MBAM says I'm clean does that mean I'm safe now?

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 11 July 2008 - 06:38 AM

How is your computer running Any more reports/signs of infection?

Can you post the scan results from MBAM?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 11 July 2008 - 09:41 AM

My computer seems to be running normally now
I never had any annoying popups in the first place or anything out of the usual, just detected a trojan so I can't really tell if it's still hiding or deleted, don't notice change in speed either

===
Malwarebytes' Anti-Malware 1.20
Database version: 938
Windows 5.1.2600 Service Pack 2

6:44:06 AM 7/11/2008
mbam-log-7-11-2008 (06-44-06).txt

Scan type: Quick Scan
Objects scanned: 42556
Time elapsed: 4 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

==
Thanks

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 11 July 2008 - 01:51 PM

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 13 July 2008 - 11:11 AM

I turned off system restore before running the antivirus and everything
I don't know, is it safe to turn it back on ?

EDIT: does it matter that I ran all the tests in normal mode. should i have done it all in safe mode?

Edited by vsvs, 13 July 2008 - 11:13 AM.


#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 13 July 2008 - 11:20 AM

Scanning in safe or normal mode will work but removal functions are not as powerful in safe mode. MBAM is designed to be at full power when malware is running so safe mode is not necessary when using it. In fact it loses some effectiveness for detection & removal when used in safe mode.

is it safe to turn it back on ?

Yes.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 13 July 2008 - 04:51 PM

Hello Quietman7, I'd just installed NOD32 and it found a trojan and now I have no idea what to do, help please?
Posted Image

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,917 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:32 PM

Posted 13 July 2008 - 07:36 PM

Hello is this a personal PC that only you use?
Or is it a business or school PC?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 14 July 2008 - 04:05 AM

This is my personal computer I use at home.

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 14 July 2008 - 11:14 AM

Go to Start > Run and type: cmd
press Ok
You may need to change the directory. If so type: cd \
At the command prompt, type or copy/paste: rd /s /q c:\recycler
(note the required spaces if typing)
press Enter.
Windows will recreate a new recycler for the drive when the computer is rebooted.

Also see: How do I Delete Windows XP Recycle Bin Hidden Files?

You may need to know the hidden directory named for your security identifier (SID). Reconfigure Windows XP to show hidden files, folders. Double-click on My Computer, go to Tools > Folder Options and click on the View tab. Under Hidden Files and Folders:
  • check "Show hidden files and folders".
  • Remove the checkmark from the box labeled "Hide Protected operating system Files (recommended)".
  • Click Apply > OK.
After reconfiguring Windows you should be able to see and open the C:\recycler folder. There may be several sub-folders starting with the name C:\recycler\S-1-5-21******. Each folder represents the recycle bin for a local user on the computer. Take note of the SID you want to remove.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 14 July 2008 - 11:29 AM

The cmd said The system cannot find the file specified

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 14 July 2008 - 12:10 PM

substitute <SID> for the security SID you need to remove. I can't read the entire entry as it stops after S-1-5-21-796845957...

Go to Start > Run and type: cmd
press Ok.
At the command prompt, type in your primay drive location, usually C:
You may need to change the directory. If so type: cd \
press Enter.
At the command prompt, type or copy/paste: cd \recycler
press Enter.
To display all hidden files, at the command prompt, type or copy/paste: dir /A
press Enter.
At the C:\RECYCLER prompt, type or copy/paste: cd <SID>
press Enter.
At the C:\RECYCLER\<SID> prompt, type or copy/paste: attrib -h info*
press Enter.
Delete any unwanted files with the del command.
At the C:\RECYCLER\<SID> prompt, type: del *.*
press Enter.
Restart the computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#13 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 14 July 2008 - 01:35 PM

Thanks for your help, I think ESET managed to delete it as it says in the log file.
7/13/2008 5:45:42 PM Real-time file system protection file C:\RECYCLER\S-1-5-21-796845957-1078145449-725345543-1003\Dc78.exe Win32/Keylogger.HotKeysHook.A trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\Explorer.EXE.
Am I in the clear now and if I am should I change my passwords and information?

Edited by vsvs, 14 July 2008 - 01:38 PM.


#14 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,124 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:32 PM

Posted 14 July 2008 - 01:49 PM

Rescan again with ESET to be sure everything has been removed and let me know the results.

Information on Keylogger.HotKeysHook.A

Keyloggers are very dangerous because they can steal sensitive information. Keyloggers sit stealthy on your system and monitor all the keys you press including all your logins, passwords and private correspondence.

If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the keylogger was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the keylogger has been removed the computer is now secure. Further, in some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

"When should I re-format? How should I reinstall?"
"Help: I Got Hacked. Now What Do I Do?"
"Where to draw the line? When to recommend a format and reinstall?"
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#15 vsvs

vsvs
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:32 PM

Posted 14 July 2008 - 02:52 PM

scanning atm, looks like it disabled my scan, will post logs in a few. there are many infiltrations found so far...

=========
The strange thing is , I went on a 2 week vacation and my pc was off the entire time and when I came back and turned the PC on Symantec found the trojan
Also, I don't have the option of reformating and reinstalling until maybe next week, any precautions I can take right now?

P.S. Can I save my pictures, documents, music, drivers, application set ups on a USB drive for reinstallation after the reformating (when I get to it) ?
Thanks

Edited by vsvs, 14 July 2008 - 03:16 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users