Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Backdoor.tidserv!inf HELP ME KILL IT DEAD


  • Please log in to reply
17 replies to this topic

#1 Vertigo1

Vertigo1

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 01 December 2008 - 12:44 AM

Heya.

I've been battling this one for the last 72 hours. I assume from the small handful of people who have already posted regarding this particular bit of handiwork, it's not all that uncommon.

Still, I feel like I've got ghonnorhea of the keyboard or something.

I'm not sure what to do. THe thing is clearly loading other software onto my computer, and neither Spybot nor Norton 360 seem to be able to kill anything.

I'm using WIndows XP on Service Pack 3, and beyond that my attempts to manually damage a few malicious files to interrupt the virus' function, I've got very little understanding of exactly what's going on, or how to make it... Well, not go on anymore, in a manner of speaking.

In short,
PLEASE HELP ME KILL IT DEAD. I'd like to get on this before it sufficiently hinders my ability to use this computer.

Thank you in advance.

Edited by Vertigo1, 01 December 2008 - 12:47 AM.


BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 01 December 2008 - 11:39 AM

Hi,

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

#3 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  

Posted 01 December 2008 - 04:09 PM

Hey, thanks.

I was kinda squirrelly about doing anything completely on my own, because the GERONIMO mentality has gotten me into quite a bit of trouble in the past, especially involving computers.

As requested, here is the logfile:


=====
=====
=====

Malwarebytes' Anti-Malware 1.30
Database version: 1306
Windows 5.1.2600 Service Pack 3

12/1/2008 2:57:53 PM
mbam-log-2008-12-01 (14-57-53).txt

Scan type: Quick Scan
Objects scanned: 49374
Time elapsed: 4 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 7
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{10ea33ed-42e2-44bf-b10c-3865b0e0ed38}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{209b2d6f-221c-4814-bac6-ceae76ed71b8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{10ea33ed-42e2-44bf-b10c-3865b0e0ed38}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{209b2d6f-221c-4814-bac6-ceae76ed71b8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\Tcpip\Parameters\Interfaces\{10ea33ed-42e2-44bf-b10c-3865b0e0ed38}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\Tcpip\Parameters\Interfaces\{209b2d6f-221c-4814-bac6-ceae76ed71b8}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.134;85.255.112.165 -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


=====
=====
=====

MBAM seems to think it's successfully removed the virus, which it claims was nothing more than a handful of bad registry entries, if I'm interpreting this data correctly.

Would I be correct to assume also that it would be wise to reboot, then re-scan, in order to be certain that I've fixed the problem, not just treated a symptom thereof?

#4 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 02 December 2008 - 12:21 AM

Well, either it WASN'T dead, or it was hiding out inside my secondary hard-disk's system files.

THe virus has returned, and I'm going to let MBAM run a full scan on both partitions of my primary drive as well as mysecondary drive, which I'm not 100% certain it did with the quick scan.

#5 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 02 December 2008 - 08:23 AM

Hi,

Yes please do a full scan on all partitions. Post the log in your next reply. :thumbsup:

#6 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 02 December 2008 - 12:39 PM

Alright, this seems to be a bit more intrusive than I would have thought previously.

THe virus seems to be repopulating the registry changes as soon as I can kill them.


The following is one of several logs recorded after my last attempt at cleaning, all of which report and claim to do the exact same thing:

=====
=====
=====

Malwarebytes' Anti-Malware 1.30
Database version: 1410
Windows 5.1.2600 Service Pack 3

12/2/2008 11:32:36 AM
mbam-log-2008-12-02 (11-32-36).txt

Scan type: Quick Scan
Objects scanned: 51014
Time elapsed: 2 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\resycled (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Files Infected:
C:\resycled\boot.com (Trojan.DNSChanger) -> Quarantined and deleted successfully.

=====
=====
=====


I ran the full scan overnight, which detected these same two errors, only in my C drive, my system drive. E drive, my protected read-only restore partition, is as clean as a virgin, and my F drive, my bulk data drive, apparently has no system files, and no errors, as you can see.

I've run MBAM four times over the last half-hour in quick-scan, and every time, it picks up these two entries for deletion, claims to delete them, then detects them again once it's done.

I'm not certain what to do next.

#7 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 02 December 2008 - 12:41 PM

Please use the Internet Explorer browser (or FireFox with IETab), and do an online scan with Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

Click Yes, when prompted to install its ActiveX component.
(Note.. for Internet Explorer 7 users: If at any time you have trouble with the "Accept" button of the license, click on the "Zoom" tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.)
The program launches and downloads the latest definition files.
  • Once the files are downloaded click on Next
  • Click on Scan Settings and configure as follows:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK and, under select a target to scan, select My Computer
When the scan is done, in the Scan is completed window (below), any infection is displayed.
There is no option to clean/disinfect, however, we need to analyze the information on the report.
Posted Image
Posted Image
To obtain the report:
Click on: Save Report As (above - red blinking arrow)
Next, in the Save as prompt, Save in area, select: Desktop
In the File name area, use KScan, or something similar
In Save as type, click the drop arrow and select: Text file [*.txt]
Then, click: Save
Please post the Kaspersky Online Scanner Report in your reply.

#8 h3llh0l3

h3llh0l3

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India

Posted 02 December 2008 - 01:16 PM

Just a quick question. How did you know that you are infected with tidserv? And if you are sure about the source that told you that you are infected with tidserv then all I gotta say is that your computer is infected with rootkit. Its easy to remove if you use the right tool, but you have to be cautious. Sorry, can't give you a soultion as MODS here don't want an unauthorized person to conk your computer.

#9 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 02 December 2008 - 04:09 PM

Hellh0l3, Norton 360 picked up the virus on my computer, and it specifically identified it as tidserv.

I was suspicious of a rootkit from the moment Norton told me it was unable to remove the virus on its own. Beyond that I know rootkits attach themselves to system files and are impossible to kill without shutting down parts of Windows, I don't know much about what I'm doing here, which is also why I've elected to ask for help.

That would explain why both Norton and MBAM weren't able to remove the virus itself, only the extension libraries and its downloads. I've been running Kaspersky since this morning; it's not exactly a rocket, but it located the same troubled areas that MBAM did already, fairly quickly.

I will update tonight after I get home from work, and it's finished running.

THanks in advance, guys.

#10 h3llh0l3

h3llh0l3

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India

Posted 02 December 2008 - 04:31 PM

Hellh0l3, Norton 360 picked up the virus on my computer, and it specifically identified it as tidserv.

I was suspicious of a rootkit from the moment Norton told me it was unable to remove the virus on its own. Beyond that I know rootkits attach themselves to system files and are impossible to kill without shutting down parts of Windows, I don't know much about what I'm doing here, which is also why I've elected to ask for help.

That would explain why both Norton and MBAM weren't able to remove the virus itself, only the extension libraries and its downloads. I've been running Kaspersky since this morning; it's not exactly a rocket, but it located the same troubled areas that MBAM did already, fairly quickly.

I will update tonight after I get home from work, and it's finished running.

THanks in advance, guys.

Thanks for the info. If I am not wrong you would have infections in c:\windows\system32 and c:\windows\system32\drivers. I guess currently the infected file name is tdssserv.xxx(xxx = sys or dll). But did you happen to check what Norton had to say about the filename?

#11 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:52 AM

Posted 02 December 2008 - 11:29 PM

Tuesday, December 2, 2008
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Tuesday, December 02, 2008 14:49:46
Records in database: 1431882


Scan settings
Scan using the following database extended
Scan archives yes
Scan mail databases yes

Scan area My Computer
C:\
D:\
E:\
F:\
G:\
H:\

Scan statistics
Files scanned 186250
Threat name 5
Infected objects 14
Suspicious objects 0
Duration of the scan 03:38:57

File name Threat name Threats count
spoolsv.exe\dll.dll/spoolsv.exe\dll.dll Infected: Trojan.Win32.Small.yon 1

C:\autorun.inf Infected: Worm.Win32.AutoRun.nuu 1

C:\Documents and Settings\Owner\Desktop\dropoff folders\mirc616.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.616 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0262385.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0263316.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0263477.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0264485.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0264556.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP755\A0264575.inf Infected: Worm.Win32.AutoRun.onp 1

D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP756\A0264613.inf Infected: Worm.Win32.AutoRun.onp 1

D:\Autorun.inf Infected: Worm.Win32.AutoRun.onp 1

F:\autorun.inf Infected: Worm.Win32.AutoRun.qin 1

F:\LIFEBOAT\0001 desktop data\Desktop backup\dropoff folders\mirc616.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.616 1

F:\Program Files\Program Files\mIRC\mirc.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.616 1

The selected area was scanned.


=====
=====
=====


H3llh013, I didn't really do much digging on Norton, because 360 is designed to work pretty much autonomously.

It appears that my restore partition is not exactly as secure as I'd imagined...

Alright. Apparently, all of my drives and partitions are compromised, including my system restore partition.
What next?

#12 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 03 December 2008 - 01:48 AM

Hi,

I have not got the time now to answer. Iĺl get back this afternoon. :thumbsup:

#13 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 03 December 2008 - 09:53 AM

Hi,

Download this file to your Desktop: http://downloads5.kaspersky-labs.com/devbuilds/AVPTool/
Start the setup_.exe-file and click "Next".
The tool will be unzipped now to his own folder on the Desktop, confirm this by pressing "Next" again.
Now, click "Scan" to start the quick scan.
When it's finished, the found malware will be showed to you, press "Delete".
Now click the button "Reports" in the main screen and save the logfile to your Desktop.
Post this logfile in your next reply (only the deleting-part)
After that you'll get this message: "Do you want to uninstall?", choose "Yes".
The tool will be deleted then.

#14 Vertigo1

Vertigo1
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 03 December 2008 - 02:47 PM

I just finished running the tool on its standard settings, but also requested that it look into my D drive, the restore partition.

After this finished, I was surprised to find that it located absolutely nothing in the C or F drives, and will be running the scan again through both of them.

For now, I've included excerpts from the logfile from the cleaning of D:
=====
=====
=====

Scan
----
Scanned: 66247
Detected: 10
Untreated: 0
Start time: 12/3/2008 12:24:05
Duration: 00:17:04
Finish time: 12/3/2008 12:41:09


Detected
--------
Status Object
------ ------
deleted: virus Worm.Win32.AutoRun.onp File: D:\Autorun.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0262385.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0263316.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0263477.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0264485.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP754\A0264556.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP755\A0264575.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP756\A0264613.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP757\A0264643.inf
deleted: virus Worm.Win32.AutoRun.onp File: D:\System Volume Information\_restore{D23EFF2A-BFEF-46A5-8364-D064E372DF2B}\RP757\A0264685.inf


Events
------
Time Name Status Reason
---- ---- ------ ------

((( this section withheld, because it's approximately 120 pages long)))

Statistics
----------
Object Scanned Detected Untreated Deleted Moved to Quarantine Archives Packed files Password protected Corrupted
------ ------- -------- --------- ------- ------------------- -------- ------------ ------------------ ---------
All objects 66247 10 0 10 0 648 130 30 4
System memory 4922 0 0 0 0 4 2 0 0
Startup objects 775 0 0 0 0 0 13 0 0
Disk boot sectors 6 0 0 0 0 0 0 0 0
Recovery (D:) 60544 10 0 10 0 644 115 30 4


Settings
--------
Parameter Value
--------- -----
Security Level Recommended
Action Prompt for action when the scan is complete
Run mode Manually
File types Scan all files
Scan only new and changed files No
Scan archives All
Scan embedded OLE objects All
Skip if object is larger than No
Skip if scan takes longer than No
Parse email formats No
Scan password-protected archives No
Enable iChecker technology No
Enable iSwift technology No
Show detected threats on "Detected" tab Yes
Rootkits search Yes
Deep rootkits search No
Use heuristic analyzer Yes


Quarantine
----------
Status Object Size Added
------ ------ ---- -----


Backup
------
Status Object Size
------ ------ ----
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp754\a0264485.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp754\a0262385.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp757\a0264685.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp755\a0264575.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp757\a0264643.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\autorun.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp754\a0263477.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp756\a0264613.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp754\a0264556.inf 103 bytes
Infected: virus Worm.Win32.AutoRun.onp d:\system volume information\_restore{d23eff2a-bfef-46a5-8364-d064e372df2b}\rp754\a0263316.inf 103 bytes

=====
=====
=====

I will post the same once I've scanned my F drive, and as well after I've re-scanned my entire C drive, since the scanner tool doesn't seem to want to look into all of my drives by default.

#15 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 03 December 2008 - 02:54 PM

Okay :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users