Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected w/ Java/CVE-2008-5353.C, Java/Selace.K, & Java/Selace.L


  • This topic is locked This topic is locked
2 replies to this topic

#1 mjr1981

mjr1981

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:08:41 AM

Posted 03 February 2010 - 05:52 AM

Hello,
These are the results of my Windows Live One Care Safety Scan. I've scanned my computer with multiple anti-malware and anti-virus programs and One Care is the only one that detects these viruses. So far I have not had any problems that are visible due to the infection except for an occassional alert that says that Microsoft wants to run an add-on and connect to my computer remotely. It's the yellow bar that drops down from the top of the screen. I never click on it to run. I read somewhere that this is related to the virus.

Exploit:Java/CVE-2008-5353.C
Location: C:\documents and settings\user\application data\sun\java\deployment\cache\6.0\18\6eb74992-63fbfb59
myf/y/appletx.class

Trojan:Java/Selace.K
Location: C:\documents and settings\user\application data\sun\java\deployment\cache\6.0\18\6eb74992-63fbfb59
myf/y/loaderx.class

Trojan:Java/Selace.L
Location: C:\documents and settings\user\application data\sun\java\deployment\cache\6.0\18\6eb74992-63fbfb59
myf/y/trewsdf.class


DDS (Ver_09-12-01.01) - NTFSx86
Run by User at 5:06:07.58 on Wed 02/03/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.521 [GMT -5:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\system32\igfxtray.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Apoint\HidFind.exe
svchost.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\User\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://www.mygobox.com/usedlaptops.php
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Dell QuickSet] c:\program files\dell\quickset\quickset.exe
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hotsyn~1.lnk - c:\program files\palm\Hotsync.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\setpoint\SetPoint.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49}
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase8942.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1240021239855
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
Notify: igfxcui - igfxsrvc.dll
Notify: LBTWlgn - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 127.0.0.1 www.spywareinfo.com

============= SERVICES / DRIVERS ===============

R2 cpuz132;cpuz132;c:\windows\system32\drivers\cpuz132_x32.sys [2010-1-7 12672]
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2009-8-2 10384]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [2009-4-17 88192]
S0 cerc6;cerc6; [x]
S3 pbfilter;pbfilter;c:\program files\peerblock\pbfilter.sys [2009-10-29 14424]

=============== Created Last 30 ================

2010-02-01 04:36:43 0 d-----w- c:\program files\Trend Micro
2010-02-01 03:09:23 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-01 03:09:21 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-01 03:09:21 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-29 02:10:16 73728 ----a-w- c:\windows\system32\javacpl.cpl
2010-01-29 01:36:37 77312 ----a-w- c:\windows\system32\ztvunace26.dll
2010-01-29 01:36:37 75264 ----a-w- c:\windows\system32\unacev2.dll
2010-01-29 01:36:37 69632 ----a-w- c:\windows\system32\ztvcabinet.dll
2010-01-29 01:36:37 162304 ----a-w- c:\windows\system32\ztvunrar36.dll
2010-01-29 01:36:37 153088 ----a-w- c:\windows\system32\unrar3.dll
2010-01-28 04:59:23 0 d-----w- c:\docume~1\alluse~1\applic~1\Alwil Software
2010-01-28 04:51:56 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-01-13 01:33:49 0 d-----w- c:\windows\system32\custom matrices
2010-01-13 01:33:41 0 d-----w- c:\windows\system32\QuickTime
2010-01-13 01:33:41 0 d-----w- c:\windows\system32\C2MP
2010-01-13 01:27:57 0 d-----w- c:\program files\Veoh Networks
2010-01-07 23:01:01 12672 ----a-w- c:\windows\system32\drivers\cpuz132_x32.sys
2010-01-07 23:01:00 0 d-----w- c:\program files\CPUID

==================== Find3M ====================

2010-01-29 02:09:55 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-27 00:47:24 32252 ---ha-w- c:\windows\system32\mlfcache.dat
2009-12-21 19:14:05 916480 ----a-w- c:\windows\system32\wininet.dll
2009-12-09 14:58:54 90112 ----a-w- c:\windows\DUMP53a2.tmp
2009-12-09 14:58:07 90112 ----a-w- c:\windows\DUMP5410.tmp
2009-12-09 14:57:21 90112 ----a-w- c:\windows\DUMP54d9.tmp
2009-12-09 14:53:49 90112 ----a-w- c:\windows\DUMP5700.tmp
2009-12-02 17:02:50 1632887 ----a-w- c:\windows\system32\ffmpegmt.dll
2009-12-02 16:56:10 4840081 ----a-w- c:\windows\system32\libavcodec.dll
2009-11-16 00:34:22 53248 ----a-w- c:\windows\PalmDevC.dll
2009-09-01 02:36:01 16384 --sha-w- c:\windows\temp\cookies\index.dat
2009-09-01 02:36:01 16384 --sha-w- c:\windows\temp\history\history.ie5\index.dat
2009-09-01 02:36:01 49152 --sha-w- c:\windows\temp\temporary internet files\content.ie5\index.dat

============= FINISH: 5:06:34.20 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:02:41 PM

Posted 10 February 2010 - 10:37 AM

Hello,

My name is Syler and I will be helping you to solve your Malware issues. If you have since resolved your issues I would appreciate if you
would let me no so I can close this topic, if you still need help please let me no what issues you are still having, in your next reply.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and
we are trying our best to keep up.

  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)


  1. Please download GMER from one of the following locations, and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zip Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  2. Disconnect from the Internet and close all running programs, as this process may crash your computer.
  3. Temporarily disable any real-time active protection so your security program drivers will not conflict with gmer's driver.
  4. Double click on Gmer to run it.
  5. Allow the gmer.sys driver to load if asked.
  6. You may see a rootkit warning window, If you do, click No.
  7. Untick the following boxes on the right side of the Gmer screen.
    Sections
    IAT/EAT
    Files
    Show All
  8. Click on and wait for the scan to finish.
  9. If you see a rootkit warning window, click OK.
  10. Push and save the logfile to your desktop.
  11. Copy and Paste the contents of that file in your next post.



Then please post back here with the following:
  • log.txt
  • info.txt
  • Gmer log

Thanks

unite.jpg


#3 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:02:41 PM

Posted 15 February 2010 - 12:40 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

unite.jpg





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users