Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I have 'TR/Dldr.Agent.HBR.2 [trojan]'


  • Please log in to reply
13 replies to this topic

#1 march1972

march1972

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:44 PM

Posted 18 June 2009 - 04:14 AM

Hi,

I have a website that recently had some malicious code injected into the home page. The hosting company looked into this for me and sent me this reply:

It appears that malicious code has been uploaded to your account via FTP using a compromised username and password. At this time, I have removed the malicious code from the account.

From our experience with malware of this nature, the user account passwords are compromised though viruses/malware located on your local computer. This malware sniffs out passwords used and stored by FTP programs located on the computer. In order to protect against future attack, you will need to run full virus and malware scans on your computers to ensure that they are clean. I recommend using multiple scanners as we have found that some scanners do not detect the malware.

MalwareBytes ( http://www.malwarebytes.org/ ) and ComboFix ( http://www.bleepingcomputer.com/combofix/how-to-use-combofix ) have been reported to be able to clean this malware.


I have downloaded malwarebytes and run the scan, it found several issues and clened them:

This is the log for that:

Malwarebytes' Anti-Malware 1.37
Database version: 2295
Windows 5.1.2600 Service Pack 3

17/06/2009 14:53:17
mbam-log-2009-06-17 (14-53-17).txt

Scan type: Full Scan (C:\|)
Objects scanned: 249698
Time elapsed: 50 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 20
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7aa32fc7-133b-4ae7-998e-ced0d9829b12} (Trojan.Dialer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d0b1b2f-4d44-48dc-ae5a-f4bbbae2a83f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1a26f07f-0d60-4835-91cf-1e1766a0ec56} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1d0b1b2f-4d44-48dc-ae5a-f4bbbae2a83f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ksi32sk (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ati64si (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\securentm (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\i386si (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Systemntmi (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ws2_32sik (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{1d0b1b2f-4d44-48dc-ae5a-f4bbbae2a83f} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\user-agent: mozilla/4.0 (compatible; msie 6.0; windows nt 5.1; sv1; http://bsalsa.com) (Trojan.Banker) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\Marc\local settings\Temp\~TM1A4.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Marc\local settings\temporary internet files\Content.IE5\WZC0FJAS\load[1].exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Marc\start menu\Programs\Startup\rncsys32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\WINDOWS\BM3f5cb6cb.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\WINDOWS\BM3f5cb6cb.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\documents and settings\Marc\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\Marc\oashdihasidhasuidhiasdhiashdiuasdhasd (Trace.Pandex) -> Quarantined and deleted successfully.



I ran it again just to be sure and this is the log:

Malwarebytes' Anti-Malware 1.37
Database version: 2295
Windows 5.1.2600 Service Pack 3

17/06/2009 14:59:20
mbam-log-2009-06-17 (14-59-20).txt

Scan type: Quick Scan
Objects scanned: 87060
Time elapsed: 3 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1d0b1b2f-4d44-48dc-ae5a-f4bbbae2a83f} (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



After that I scanned again and it reported no problems.

however my avir anitvirus popped up a warnign when I turned it back on:

Virus or unwanted program 'TR/Dldr.Agent.HBR.2 [trojan]'
detected in file 'C:\System Volume Information\_restore{8BB3CF17-27BE-41E1-9BD8-8D2D3F26B664}\RP458\A0059576.exe.
Action performed: Deny access



So I think I still have something on my system.

Hopefully this is enough info, if you need any more let me know.

thanks

M

BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 18 June 2009 - 07:32 AM

Hi,

Strange they advice ComboFix, because that's a tool that should be used under supervision of a HJT Team Member. I suggest you tell this to your hosting company.

Now, please do a full scan with MBAM, and post the results. :thumbsup:

#3 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  

Posted 18 June 2009 - 09:43 AM

Hi,

Strange they advice ComboFix, because that's a tool that should be used under supervision of a HJT Team Member. I suggest you tell this to your hosting company.

Now, please do a full scan with MBAM, and post the results. :thumbsup:

ok i'll let them know, i have 2 hosting companies and 1 was no help at all, at least they set me in the right direction:)

anyway i just did another scan with MBAM and this is the log:

Malwarebytes' Anti-Malware 1.37
Database version: 2295
Windows 5.1.2600 Service Pack 3

18/06/2009 14:54:37
mbam-log-2009-06-18 (14-54-37).txt

Scan type: Full Scan (C:\|)
Objects scanned: 249574
Time elapsed: 44 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



so i can see it didn't find anything.

#4 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 18 June 2009 - 09:44 AM

Hi,

Please go to Kaspersky website and perform an online antivirus scan.

Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.
  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  • Please post this log in your next reply.
If you need a tutorial, see here

#5 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:44 PM

Posted 19 June 2009 - 02:55 AM

hi, log from kaspersky:


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Friday, June 19, 2009
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Thursday, June 18, 2009 16:59:19
Records in database: 2361344
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
F:\
G:\
H:\
I:\
Y:\
Z:\

Scan statistics:
Files scanned: 153601
Threat name: 9
Infected objects: 11
Suspicious objects: 2
Duration of the scan: 02:06:58


File name / Threat name / Threats count
C:\Documents and Settings\Marc\Local Settings\Application Data\Microsoft\Outlook\archive.pst Suspicious: Trojan-Spy.HTML.Fraud.gen 2
C:\Documents and Settings\Marc\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Infected: Trojan-Spy.Win32.Zbot.hpc 1
C:\Documents and Settings\Marc\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Infected: Trojan-Downloader.Win32.Small.ahhg 1
C:\Documents and Settings\Marc\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Infected: Trojan-Downloader.Win32.Small.ahhl 1
C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\4C6C3035d01 Infected: Exploit.JS.Pdfka.lr 1
C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\A5B72E63d01 Infected: Exploit.SWF.Agent.be 1
C:\Documents and Settings\Marc\Local Settings\Temp\12B.tmp Infected: Trojan-Downloader.Win32.Boltolog.fto 1
C:\Documents and Settings\Marc\Local Settings\Temp\~TM127.tmp Infected: Trojan.Win32.Agent.cmnr 1
C:\Documents and Settings\Marc\Local Settings\Temporary Internet Files\Content.IE5\UFQZQ91O\load[1].exe Infected: Trojan.Win32.Agent.cmnr 1
C:\Documents and Settings\Marc\Start Menu\Programs\Startup\rncsys32.exe Infected: Trojan.Win32.Agent.cmnr 1
C:\WINDOWS\ld09.exe Infected: Net-Worm.Win32.Koobface.ze 1
C:\WINDOWS\Temp\wpv981243627542.exe Infected: Trojan-Downloader.Win32.Boltolog.fto 1

The selected area was scanned.



#6 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 June 2009 - 06:24 AM

Hi,

Print the instructions below, because you don't have internetaccess temporary when performing the steps

Start your computer in Safe Mode (use the F8-method).

Then, do this:

Open Notepad.
Copy this in the Notepad-file:

@ECHO OFF
IF EXIST log.txt DEL log.txt
ECHO Deleting files>>log.txt
FOR %%g in (
"C:\Documents and Settings\Marc\Local Settings\Temp\12B.tmp"
"C:\Documents and Settings\Marc\Local Settings\Temp\~TM127.tmp"
"C:\Documents and Settings\Marc\Start Menu\Programs\Startup\rncsys32.exe"
C:\WINDOWS\ld09.exe
C:\WINDOWS\Temp\wpv981243627542.exe) DO (
IF EXIST %%g (
ATTRIB -r -s -h %%g
DEL %%g
IF EXIST %%g (
ECHO %%g not deleted>>log.txt
) ELSE (
ECHO %%g deleted>>log.txt)
) ELSE (
ECHO %%g not found>>log.txt))
>>log.txt (
ECHO.
ECHO Deleting folders)
FOR %%I in (
"C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\4C6C3035d01"
"C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\A5B72E63d01"
"C:\Documents and Settings\Marc\Local Settings\Temporary Internet Files\Content.IE5\UFQZQ91O") DO (
IF EXIST %%I (
RD /S /Q %%I
IF EXIST %%I (
ECHO %%I not deleted>>log.txt
) ELSE (
ECHO %%I deleted>>log.txt)
) ELSE (
ECHO %%I not found>>log.txt))
START NOTEPAD.EXE log.txt

Go to File - Save as...
Fill in the next values:
Location: Desktop
File name: del.bat
File type: All files (*.*).
Now, click Save.
Doubleclick del.bat.

Restart your pc in normal mode again.

Post the contents of the logfile that opens in your next reply.

Edited by superbird, 19 June 2009 - 06:25 AM.


#7 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  

Posted 19 June 2009 - 08:20 AM

ok here is the log:


Deleting files
"C:\Documents and Settings\Marc\Local Settings\Temp\12B.tmp" not found
"C:\Documents and Settings\Marc\Local Settings\Temp\~TM127.tmp" not found
"C:\Documents and Settings\Marc\Start Menu\Programs\Startup\rncsys32.exe" not found
C:\WINDOWS\ld09.exe not found
C:\WINDOWS\Temp\wpv981243627542.exe not found

Deleting folders
"C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\4C6C3035d01" not found
"C:\Documents and Settings\Marc\Local Settings\Application Data\Mozilla\Firefox\Profiles\vowhccbf.default\Cache\A5B72E63d01" not found
"C:\Documents and Settings\Marc\Local Settings\Temporary Internet Files\Content.IE5\UFQZQ91O" deleted

#8 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 June 2009 - 08:21 AM

Hi,

Which problems do you still have? :thumbsup:

#9 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:44 PM

Posted 19 June 2009 - 08:36 AM

ok, thanks for the help so far.

so from that log does that mean my system is clean now?


thanks


Marc

#10 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 June 2009 - 08:37 AM

Everything looks clean. But do you still have problems? If so, I can help you maybe, if not, I'll post the last steps.

#11 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  

Posted 19 June 2009 - 08:42 AM

everything seems to be running a lot smoother now and i just scanned with Malwarebytes and it found nothing.

what other problems should i look for?

If nothing then yes please post the last steps :thumbsup:

#12 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 June 2009 - 08:43 AM

Hi,

Do this:

1. Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs from changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected)1. Turn off System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
2. Restart your computer.

3. Turn ON System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check Turn off System Restore.
Click Apply, and then click OK.
[/list]System Restore will now be active again.

2. Go to the Windows update site and download and install all available updates, so your computer is prtected against malware.

3. Read this page To prevent yourself against re-infection.

4. You can delete all used tools and programs.

#13 march1972

march1972
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:44 PM

Posted 19 June 2009 - 08:57 AM

ok thanks a lot for your help.

system is running smooth again :thumbsup:

#14 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 June 2009 - 09:13 AM

You're welcome. :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users