Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HELP! Troj/Rustok-N - NEED to remove it


  • Please log in to reply
19 replies to this topic

#1 kasian

kasian

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 04 August 2009 - 09:36 AM

Hi, is there anyone that can help me remove this Malware off my computer?
apparently it is a pretty bad thing to have on your computer, so yeah, I just
really need it off quick lol.

It doesn't let me watch video's on some youtube-like sites.
This is what it says.


Your computer (IP: 60.(removed)) generates an attacking DOS requests at our servers.
This attack was provoked by the spyware/virus named 'Troj/Rustok-N'


please, ANY help to get rid of this?!?

Thanks in advance


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,762 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:19 PM

Posted 04 August 2009 - 11:10 AM

Hello and welcome please run these next. If you have Spybot installed temporarily disable it.
Next run ATF:
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.

Next run MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 05 August 2009 - 12:23 AM

Thank you for your help.

Here is the log you asked for...

Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 6.0.6001 Service Pack 1

5/08/2009 2:38:57 PM
mbam-log-2009-08-05 (14-38-57).txt

Scan type: Quick Scan
Objects scanned: 86146
Time elapsed: 8 minute(s), 4 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 1
Registry Data Items Infected: 10
Folders Infected: 8
Files Infected: 15

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\MacroVirus (Rogue.MacroVirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\{NSINAME} (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ku2qr7dv.exe (Trojan.FakeAlert.H) -> Delete on reboot.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{005452b9-7548-459f-9fbf-6022ab5d5c7e}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f3d3f65a-ec46-4fab-9a4f-0b65a8b70f3c}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{005452b9-7548-459f-9fbf-6022ab5d5c7e}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f3d3f65a-ec46-4fab-9a4f-0b65a8b70f3c}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{005452b9-7548-459f-9fbf-6022ab5d5c7e}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{f3d3f65a-ec46-4fab-9a4f-0b65a8b70f3c}\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.22,85.255.112.130 -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\MacroVirus (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Quarantine (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Registry Backups (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WatchFree (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WatchFree (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Files Infected:
C:\Windows\System32\ku2qr7dv.exe (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.
C:\Program Files\MacroVirus\mav.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log\2008 Mar 26 - 03_00_05 AM_578.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log\2008 Mar 26 - 03_00_06 AM_973.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log\2008 Mar 26 - 03_00_07 AM_004.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log\2008 Mar 28 - 03_00_03 AM_678.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Log\2008 Mar 28 - 03_00_05 AM_515.log (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\CustomScan.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\IgnoreList.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\ScanInfo.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\ScanResults.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\SelectedFolders.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Users\Luke_2\AppData\Roaming\MacroVirus\Settings\Settings.stg (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Windows\Tasks\MacroVirus Scheduled Scan.job (Rogue.MacroVirus) -> Quarantined and deleted successfully.
C:\Windows\System32\gaopdxcounter (Trojan.Agent) -> Quarantined and deleted successfully.

Is there still more to do?

Thanks


EDIT: I've been able to access the sites that wouldn't let me before,
and they work now! That means it must be gone, right?

Thank you so much for your help.

I'm a very satisfied customer, woop!

Edited by kasian, 05 August 2009 - 12:54 AM.


#4 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 05 August 2009 - 12:42 AM

C:\Windows\System32\gaopdxcounter (Trojan.Agent) -> Quarantined and deleted successfully.

Is there still more to do?


This can be a nasty rootkit/backdoor trojan

Let's look for rootkits

http://rootrepeal.googlepages.com/

http://rootrepeal.googlepages.com/RootRepeal.zip

or

http://ad13.geekstogo.com/RootRepeal.zip

Just use the file tab at the bottom, scan and paste the report into a reply here please

Posted Image
Chewy

No. Try not. Do... or do not. There is no try.

#5 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 06 August 2009 - 07:19 AM

Alrighty, I'll run it overnight and post log in the morning because it seems to
be taking a while.

Anything I should do if there is still bad things there?

Thanks

Edited by kasian, 06 August 2009 - 07:21 AM.


#6 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 06 August 2009 - 07:30 AM

Rootkit scans are not easy to understand and really need to be handled by someone with a little experience or training.

We need to really reload MBAM but we're going to see that scan first
Chewy

No. Try not. Do... or do not. There is no try.

#7 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 August 2009 - 12:40 AM

The scan was taking more than overnight,
I left it from about 1 30am to 3 30 pm, and it was still going
These were the findings on each scan that was run.
It was also not letting me click any buttons after I clicked
stop on the scan, so I just took a screen shot of what it said/found


Posted Image

Thank you.

#8 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 10 August 2009 - 12:47 AM

Will MBAM update?

Boopme alreay gave the directions but your log showed an old version.
Chewy

No. Try not. Do... or do not. There is no try.

#9 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 August 2009 - 01:26 AM

okay, it's updated now

#10 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 10 August 2009 - 01:27 AM

Run a quick scan and post that log
Chewy

No. Try not. Do... or do not. There is no try.

#11 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 August 2009 - 01:43 AM

Here's the log, just restarting now coz it says to

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 6.0.6001 Service Pack 1

10/08/2009 4:42:34 PM
mbam-log-2009-08-10 (16-42-34).txt

Scan type: Quick Scan
Objects scanned: 114541
Time elapsed: 13 minute(s), 17 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\WiniFighter (Rogue.WiniFighter) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WiniFighter (Rogue.WiniFighter) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\install.exe (Trojan.Agent) -> Quarantined and deleted successfully.

#12 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 10 August 2009 - 01:52 AM

That's better but we still have not updated fully

Malwarebytes' Anti-Malware 1.40
Database version: 2589
Windows 5.1.2600 Service Pack 3


Malwarebytes' Anti-Malware 1.40
Database version: 2551


been 38 databases since your version
Chewy

No. Try not. Do... or do not. There is no try.

#13 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 August 2009 - 01:53 AM

so what do i do? lol

#14 kasian

kasian
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 August 2009 - 02:00 AM

is 2589 the latest? coz I updated again and that's the version I have now

#15 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:03:19 PM

Posted 10 August 2009 - 02:03 AM

Run a full scan this time
Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users