Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Backdoor.bot infections


  • This topic is locked This topic is locked
9 replies to this topic

#1 GeraldUK

GeraldUK

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 22 May 2009 - 02:32 AM

I seem to have got my Windows XP Home desktop system infected. about a week ago (Kaspersky is my anti virus and Kerio was my firewall) as shown in a Spybot Search & Destroy scan and an Ad-Aware scan. A much more computer literate friend suggested I download SUPERantispyware, and, as it was recommended on this site, I downloaded Malwarebytes.

The first sign of infection was when in Internet Express and I used Google, the pages displayed were not related to the search but I was transferred to other sites. Running the scan Spybot found:
Win32.Zbot
Win32.Agent.pz
Win32.Delf.uc.

After 2 scans with Spybot the files were deleted, and the corrupt Registy entries. Spybot reported “No immediate threats reported.”

I then ran Malwarebyes which found different problems:
9 backdoor bots, all starting “st_” - for example C:\WINDOWS\st_1241839481.exe (Backdoor.Bot) -> No action taken., plus
C:\WINDOWS\system32\SYS32DLL.exe (Worm.KoobFace) -> No action taken.

I then let Malwarebytes fix the problems, and this caused any program to access the Internet to go into a not responding state. It was noticeable that the address bar in I.E was empty and tools - internet options did not function. My mail program Eudora reported a problem and would not load. I later reversed the clearance of these Malwarebytes fixes as I did not think I would get Internet access again - albeit allowing back the trojans.

I have Hijackthis and did a log. I used this to remove 2 items in the Registry related to use of a proxy server. I then ran SUPERantispyware which found Rootkit Agent/Haxdoor plus
C:\WINDOWS\SYSTEM32\SORRD.SYS. In theory these were fixed and quarantined.

At this stage Internet Explorer showed signs of activity and I reconnected using help from my ISP, talktalk.

About this stage, my Kerio firewall developed a problem, and I replaced it with ZoneAlarm free.

Since then I have run Kaspersky - which has always reported no problems with scans;
SUPERantispyware which then found:
Trojan.dropper/Win-NV
Trojan.Downloader-Gen/Bundi
A2405840.EXE in System Volume Information.

These were cleared.

Then running Spybot again it found Win32.delf.uc in a Registry entry. Problem fixed.

I then ran Window XP Malicious Removal Tool (mrt /f) and it found
Backdoor: Win32/Haxdoor.gen!B. (In theory this had been found and fixed by SUPERantisptware? - not quite the same name)
This was removed and a successful restart. Both Spybot and SUPERantispyware were run both showing no problems.

I am sorry for boring readers with this catalogue of use of various Spyware tools trying to clean up my computer. Interesting, frustrating, but understandable that various programs pick up various faults!

Still, I am now left with the trojans/virus identified by Malwarebytes plus some dodgy programs noted in their log as bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\,C:\WINDOWS\system32\pavuppad.exe.

Any helpful advice would be very welcome.

BC AdBot (Login to Remove)

 


m

#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:49 PM

Posted 22 May 2009 - 08:35 AM

Please post the results of your MBAM scan for review.

To retrieve the Malwarebytes Anti-Malware scan log information, launch MBAM.
  • Click the Logs Tab at the top.
    • The log will be named by the date of scan in the following format: mbam-log-date(time).txt
      -- If you have previously used MBAM, there may be several logs showing in the list.
  • Click on the log name to highlight it.
  • Go to the bottom and click on Open.
  • The log should automatically open in notepad as a text file.
  • Go to Edit and choose Select all.
  • Go back to Edit and choose Copy or right-click on the highlighted text and choose copy from there.
  • Come back to this thread, click Add Reply, then right-click and choose Paste.
  • Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Logs are saved to the following locations:
-- In XP: C:\Documents and Settings\<Username>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs
-- In Vista: C:\Documents and Settings\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 GeraldUK

GeraldUK
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 22 May 2009 - 02:43 PM

Hi, quietman7.
This is the most recent MAM log.
Look forward to your observations.



Malwarebytes' Anti-Malware 1.36
Database version: 2164
Windows 5.1.2600 Service Pack 3

22/05/2009 20:36:34
mbam-log-2009-05-22 (20-36-26).txt

Scan type: Quick Scan
Objects scanned: 85861
Time elapsed: 2 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 3
Files Infected: 14

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{f272845d-cec2-4f95-92ee-6d08fdfbd471} (Rogue.EvidenceEliminator) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{1925c7e1-5540-4675-8198-8a2779d4072a} (Trojan.Banker) -> No action taken.
HKEY_CLASSES_ROOT\Typelib\{0e6117e2-c367-4be3-8045-52669e71b5df} (Rogue.EvidenceEliminator) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1925c7e1-5540-4675-8198-8a2779d4072a} (Trojan.Banker) -> No action taken.
HKEY_CLASSES_ROOT\Eeshellx.ShellExt (Rogue.EvidenceEliminator) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twext.exe,C:\WINDOWS\system32\pavuppad.exe,) Good: (userinit.exe) -> No action taken.

Folders Infected:
C:\Program Files\Evidence Eliminator (Rogue.EvidenceEliminator) -> No action taken.
C:\WINDOWS\system32\twain_32 (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\lowsec (Stolen.Data) -> No action taken.

Files Infected:
C:\Program Files\Evidence Eliminator\INSTALL.LOG (Rogue.EvidenceEliminator) -> No action taken.
C:\WINDOWS\system32\lowsec\local.ds (Stolen.Data) -> No action taken.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.Data) -> No action taken.
C:\WINDOWS\system32\a9k.bin (Trojan.Agent) -> No action taken.
C:\WINDOWS\st_1241839481.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1241840647.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1241843211.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1241845743.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1241846774.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1241852446.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1242255450.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1242260509.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\st_1242656204.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\z98a.bin (Malware.Trace) -> No action taken.

#4 GeraldUK

GeraldUK
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 22 May 2009 - 02:50 PM

quietman7

Just to give you some background, I used to use Evidence Eliminator some years ago. It developed a fault and would not run some 12 months ago, so it has not been used since then, and I substituted CCleaner instead.

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:49 PM

Posted 22 May 2009 - 04:12 PM

Your Malwarebytes Anti-Malware log shows "No action taken". This usually occurs if you forget to click "Remove Selected" and instead just click "Save Logfile".

Now rescan again with Malwarebytes Anti-Malware but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 GeraldUK

GeraldUK
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 22 May 2009 - 04:58 PM

I will do as requested.

The reason for NOT letting Malwarebytes finish and get rid of the malware was because when I did that previously, the process took out my ability to go online.

So - my next post might be from a friend's pc!!

#7 GeraldUK

GeraldUK
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 22 May 2009 - 06:06 PM

Quietman7

Updated MAM and ran full scan. Log file below. I am also typing this from my own pc so Internet connection fine. (The G drive is an external drive I use for backups).


Malwarebytes' Anti-Malware 1.36
Database version: 2167
Windows 5.1.2600 Service Pack 3

22/05/2009 23:48:12
mbam-log-2009-05-22 (23-48-12).txt

Scan type: Full Scan (C:\|E:\|F:\|G:\|H:\|)
Objects scanned: 264001
Time elapsed: 43 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 3
Files Infected: 29

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{f272845d-cec2-4f95-92ee-6d08fdfbd471} (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1925c7e1-5540-4675-8198-8a2779d4072a} (Trojan.Banker) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{0e6117e2-c367-4be3-8045-52669e71b5df} (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1925c7e1-5540-4675-8198-8a2779d4072a} (Trojan.Banker) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Eeshellx.ShellExt (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twext.exe,C:\WINDOWS\system32\pavuppad.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Evidence Eliminator (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain_32 (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec (Stolen.Data) -> Quarantined and deleted successfully.

Files Infected:
G:\My Backup\Program Files\ShareScope\Data\s0094.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\My Backup\Program Files\ShareScope\Data\s0096.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\My Backup\Program Files\ShareScope\Data\s0144.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\My Backup\Program Files\ShareScope\Data\s0146.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\My Backup\Program Files\ShareScope\Data\s0147.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\ShareScope Backup\Backup18_7_08\ShareScope\Data\s0094.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\ShareScope Backup\Backup18_7_08\ShareScope\Data\s0096.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\ShareScope Backup\Backup18_7_08\ShareScope\Data\s0144.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\ShareScope Backup\Backup18_7_08\ShareScope\Data\s0146.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\ShareScope Backup\Backup18_7_08\ShareScope\Data\s0147.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\Program Files\ShareScope\Data\s0094.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\Program Files\ShareScope\Data\s0096.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\Program Files\ShareScope\Data\s0144.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\Program Files\ShareScope\Data\s0146.EXE (Adware.BHO) -> Quarantined and deleted successfully.
G:\Program Files\ShareScope\Data\s0147.EXE (Adware.BHO) -> Quarantined and deleted successfully.
C:\Program Files\Evidence Eliminator\INSTALL.LOG (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\local.ds (Stolen.Data) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.Data) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\a9k.bin (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241839481.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241840647.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241843211.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241845743.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241846774.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1241852446.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1242255450.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1242260509.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\st_1242656204.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\z98a.bin (Malware.Trace) -> Quarantined and deleted successfully.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:49 PM

Posted 22 May 2009 - 07:35 PM

Some infections are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. Sometimes there is hidden piece of malware which has not been detected by your security tools that protects malicious files and registry keys (which have been detected) so they cannot be permanently deleted. Disinfection will probably require the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a DDS/HijackThis log for further investigation.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". If you cannot complete a step, then skip it and continue with the next. In Step 6 there are instructions for downloading and running DDS which will create a Pseudo HJT Report as part of its log.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 GeraldUK

GeraldUK
  • Topic Starter

  • Members
  • 88 posts
  • OFFLINE
  •  
  • Local time:07:49 PM

Posted 23 May 2009 - 05:15 AM

quietman7

Many thanks for your help, and I will do as you suggest.

With the time difference between the UK and Virginia I was in bed and asleep when you posted!

Thanks again.

#10 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,703 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:02:49 PM

Posted 16 June 2009 - 01:59 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/234297/trojan-agent-stolendata-others-plus-xp-blue-screen/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond. Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users