Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"Secure" Websites asking for inappropriate information


  • This topic is locked This topic is locked
3 replies to this topic

#1 sherlockelly

sherlockelly

  • Members
  • 58 posts
  • OFFLINE
  •  
  • Local time:05:19 PM

Posted 21 February 2010 - 02:36 PM

As of this morning, certain sites have been asking me for information that isn't appropriate when I log in. Bank of America redirects me from the front page to this page (https://sitekey.bankofamerica.com/sas/signon.do) once I enter in my username, and won't let me continue to my accounts. It hasn't even shown me my sitekey.

From Capital One, it sends me to this page (in a FRAME no less), that also asks for my pin. The bottom of the screen notes that the page contains unauthorized content.


I've run Malwarebytes and Spybot and removed everything they said was infected. I've restarted after that and still, its asking me for that information. In both Firefox AND IE. On my other computer, it's taken me right to the proper page without a problem, without asking me to enter my pin.

I haven't downloaded anything or opened any infected file (that I know of) and after exhausting all of my virus scan software, I'm at a loss.

What's going on! I want my computer to be secure!

BC AdBot (Login to Remove)

 


#2 xblindx

xblindx

  • Banned
  • 1,923 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:19 PM

Posted 21 February 2010 - 03:11 PM

Hi, could you post a log file from Malwarebytes Anti-Malware? They can be found in the "Logs" tab of the program.

#3 sherlockelly

sherlockelly
  • Topic Starter

  • Members
  • 58 posts
  • OFFLINE
  •  
  • Local time:05:19 PM

Posted 21 February 2010 - 03:19 PM

This is the one with the infected files:

Malwarebytes' Anti-Malware 1.44
Database version: 3772
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/21/2010 10:44:01 AM
mbam-log-2010-02-21 (10-44-01).txt

Scan type: Full Scan (C:\|)
Objects scanned: 209578
Time elapsed: 36 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 30

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\QuickyPlaeyrSoft (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\HelpAssistant\Start Menu\Programs\QuickyPlaeyr (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\HelpAssistant\Local Settings\Application Data\codecsetup.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Application Data\cp_setup_assist.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\1A1.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\1A4.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\1A7.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\A66.tmp (Rootkit.MBR) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\fbTu.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\incosnet.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\jmqB.dll (Rootkit.MBR) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temp\prun.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\HelpAssistant\Local Settings\Temporary Internet Files\Content.IE5\T751192Q\eU230d9c2eH5278e3adV03007f35002Raec399e2102T190d4619Q000002fc901801F0016000aJ0d000601l0409Ke2c397c330dP000501080[1] (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kelly\Local Settings\Application Data\codecsetup.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kelly\Local Settings\Application Data\cp_setup_assist.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Pahelika - Secret Legends\Uninstall.exe (Malware.Packer.Krunchy) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0080187.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0080188.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0080429.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0080465.dll (Rootkit.MBR) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0083165.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0083166.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0083405.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0083441.dll (Rootkit.MBR) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0085170.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0085171.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0085413.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP266\A0085449.dll (Rootkit.MBR) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP274\A0091156.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP274\A0091157.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP275\A0091707.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{4D4F4768-A953-4DC2-8702-7F3587BE3E3B}\RP275\A0091708.exe (Trojan.Agent) -> Quarantined and deleted successfully.


This is the clean follow-up scan

Malwarebytes' Anti-Malware 1.44
Database version: 3772
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/21/2010 11:42:17 AM
mbam-log-2010-02-21 (11-42-17).txt

Scan type: Full Scan (C:\|)
Objects scanned: 209240
Time elapsed: 48 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



#4 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,807 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:08:19 PM

Posted 21 February 2010 - 03:27 PM

I have moved your duplicate topic to the log forum here: http://www.bleepingcomputer.com/forums/t/297518/secure-websites-asking-for-inappropriate-information/

Because you have a log posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by an MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users