Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

From malware to trojanhorse Spamtools.fys


  • Please log in to reply
8 replies to this topic

#1 Overheated90

Overheated90

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:07 AM

Posted 27 July 2010 - 03:55 PM

Hello,

I never had any problem with my computer... but then the most worst thing happenend,
VIRUS ATTACK.. First i got the Animalware doctor. that's a FAKE viruscanner,(dident download it) it popped up and placed some virusses in my computer.
after some work the Fake Protector = gone. but i saw it left some bad things.

When i let my virusprotector scan, (AVG free) and let Mbam scan, Mbam doesen't show anything anymore, but AVG does.

it says i have different Trojanhorse Spamtool.fys in my system (WINDOWS)

AVG LOG ; Cause i live in the netherlands the log is in the dutch

but u can see the Trojan Horse SpamTool.FYS and the trojan horse Generic17.BKCS
also i got a warning wich says
Trojan horse Rootkit-Pakes.AA on file c:windows/system32/drivers/ndis.sys


Infecties
Bestand;"Infectie";"Resultaat"
C:\WINDOWS\System32\svchost.exe (572):\memory_00400000;"Trojaans paard SpamTool.FYS";"Object is niet toegankelijk."
C:\WINDOWS\System32\svchost.exe (572);"Trojaans paard SpamTool.FYS";""
C:\WINDOWS\System32\svchost.exe (536):\memory_00400000;"Trojaans paard SpamTool.FYS";"Object is niet toegankelijk."
C:\WINDOWS\System32\svchost.exe (536);"Trojaans paard SpamTool.FYS";""
C:\WINDOWS\System32\svchost.exe (124):\memory_00400000;"Trojaans paard SpamTool.FYS";"Object is niet toegankelijk."
C:\WINDOWS\System32\svchost.exe (124);"Trojaans paard SpamTool.FYS";""
C:\WINDOWS\system32\services.exe (712):\memory_09500000;"Trojaans paard Generic17.BKCS";"Object is niet toegankelijk."
C:\WINDOWS\system32\services.exe (712);"Trojaans paard Generic17.BKCS";""


i hope anybody can help me out


Many Thanks,


,,Overheated90

Edited by Overheated90, 28 July 2010 - 06:08 AM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:07 AM

Posted 28 July 2010 - 09:48 AM

Hello and welcome.. Let's do it this way.

Reboot into Safe Mode with Networking
How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode with Networking using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.


>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.

RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply
Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.



Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Overheated90

Overheated90
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:07 AM

Posted 29 July 2010 - 04:27 AM

hello Boopme,

Thanks for your response,

I've done exactly as you mentioned me in your post,

First the Rkill log -->

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Administrator on 29-07-2010 at 11:56:56.

Processes terminated by Rkill or while it was running:

C:\Documents and Settings\Administrator\Bureaublad\rkill.scr

Rkill completed on 29-07-2010 at 11:57:04


Quite strange, becouse it seems not to canceled any programs. (i've done this in the Safe mode).

Then the Super anti spyware. Log -->

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/29/2010 at 01:01 PM

Application Version : 4.41.1000

Core Rules Database Version : 5284
Trace Rules Database Version: 3096

Scan type : Complete Scan
Total Scan Time : 01:01:04

Memory items scanned : 267
Memory threats detected : 0
Registry items scanned : 7504
Registry threats detected : 2
File items scanned : 88707
File threats detected : 36

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@invitemedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.undertone[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@interclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@collective-media[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
.trafficmp.com [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.trafficmp.com [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
cms.trafficmp.com [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.doubleclick.net [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
C:\Documents and Settings\LocalService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\LocalService\Cookies\system@msnaccountservices.112.2o7[1].txt
content.yieldmanager.edgesuite.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\F5ZTW7N2 ]

Trojan.Agent/Gen
HKLM\Software\AGProtect
HKLM\Software\AGProtect#Cfg

Adware.AdRotator
C:\WINDOWS\$NTUNINSTALLMTF1011$\apUninstall.exe
C:\WINDOWS\$NTUNINSTALLMTF1011$\zrpt.xml
C:\WINDOWS\$NTUNINSTALLMTF1011$
C:\Documents and Settings\Administrator\Application Data\SKY-BANNERS\skb
C:\Documents and Settings\Administrator\Application Data\SKY-BANNERS
C:\Documents and Settings\Administrator\Application Data\STREET-ADS\sta
C:\Documents and Settings\Administrator\Application Data\STREET-ADS

Rogue.AntiMalwareDoctor
C:\Documents and Settings\Administrator\Application Data\E06D20A94073EB2415498356D770283E

Trojan.Agent/Gen-Krpytik
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\BUREAUBLAD\MAP RANDY\AGE OF MYTHOLOGY\AOM_NOCD_LOADER.EXE
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\BUREAUBLAD\MAP RANDY\AGE OF MYTHOLOGY TITANS\AOMX_NOCD_LOADER.EXE

Trojan.VXGame-Variant/D
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\HIDEWA.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\SHOWWA.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\WA_NEXT.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\WA_PAUSE.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\WA_PLAY.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\WA_PREV.EXE
C:\PROGRAM FILES\WINDOWS SIDEBAR\SHARED GADGETS\WINAMP GADGET.GADGET\WINAMPEXE\WA_STOP.EXE


He founded alot of Threats, but it seems he diden't find the Spamtools and generick bcks, (and the rootpack AA)
After i've started the Normal mode 've updated MBAM and let him scan. The log --> (in dutch)

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Databaseversie: 4365

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

29-7-2010 13:55:19
mbam-log-2010-07-29 (13-55-19).txt

Scantype: Snelle scan
Objecten gescand: 132287
Verstreken tijd: 30 minuut/minuten, 3 seconde(n)

Geheugenprocessen ge´nfecteerd: 0
Geheugenmodulen ge´nfecteerd: 0
Registersleutels ge´nfecteerd: 0
Registerwaarden ge´nfecteerd: 0
Registerdata ge´nfecteerd: 0
Mappen ge´nfecteerd: 0
Bestanden ge´nfecteerd: 6

Geheugenprocessen ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Geheugenmodulen ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Registersleutels ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Registerwaarden ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Registerdata ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Mappen ge´nfecteerd:
(Geen kwaadaardige objecten gedetecteerd)

Bestanden ge´nfecteerd:
C:\Documents and Settings\Administrator\Application Data\ogix.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\8hreqgj1t.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\odyot.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\ukdoi.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Drivers\ntndis.sys (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\system32\ipsecndis.sys (Rootkit.Agent) -> Delete on reboot.


The last 2 threats (the problem in the System32 Drivers) doesen't seem to be repaired after i rebooted.
i'm scanning again with AVG now, and he still shows me the same threats mentioned in my first post above, (spamtools, genericks and rootpack AA)

My computer doesen't seem to be changed, it looks like its a bit more slowly,
i'm not sure what to do now, becouse the Superantispyware is showing me threats wich Mbam and AVG never showed me.

what should i do now?

Thank you,







,,Overheated90

Edited by Overheated90, 29 July 2010 - 07:17 AM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:07 AM

Posted 29 July 2010 - 10:51 AM

OK we have a backdoo/bot and rootkit infections... So first I will post somw advice.

One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.


To clean... Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9,which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If Gmer won't run,skip it and move on.
Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Overheated90

Overheated90
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:07 AM

Posted 30 July 2010 - 07:31 AM

Hello,

i've decided to Reinstall windows, i'm afraid there will be virusses and kinda left, we've brought the computer to the nearby computer store,
We're contacting the banks and everything


thank you alot for your help, and advising, i really appreciate it, and hopefully not to many things are send to the hacker
sadly it ends this way.


,,Overheated90

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:07 AM

Posted 30 July 2010 - 11:35 AM

Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.


2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe/.scr/.htm/.html/.xml/.zip/.rar files as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.

Download Belarc Advisor - builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser.
Run it and then print out the results, they may be handy.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Overheated90

Overheated90
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:07 AM

Posted 30 July 2010 - 11:58 AM

Hey,

Thanks for your information, it came in very handy,
The computer is already brought to the nearby computer store, i guess they know what they should do,
As far we know, the computer will return completely clean.
Before i've back upped only a few photo's so i hope that won't be a problem.

Is there any way to be sure my data's (wich maybe are send to) are safe?
As far there are no weird things on our bankdata, but i'm a lil bit scared, becouse i don't know what i can expect.
won't like to see, that tomorrow a lot of money has been gone.
Becouse i live in the dutch, i can't use the links very well, mentioned in ur post above.

,,Overheated90

Edited by Overheated90, 30 July 2010 - 12:06 PM.


#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:07 AM

Posted 30 July 2010 - 12:18 PM

Hi, photo's and such are generally safe. What ever you back scan that folder or CD etc ... separately. Here's some further info...

Rootkits, backdoor Trojans, Botnets, and IRC Bots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:

What danger is presented by rootkits?
Rootkits and how to combat them
r00tkit Analysis: What Is A Rootkit

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
What Should I Do If I've Become A Victim Of Identity Theft?
Identity Theft Victims Guide - What to do


Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

When should I re-format? How should I reinstall?
Help: I Got Hacked. Now What Do I Do?
Where to draw the line? When to recommend a format and reinstall?


Tips to protect yourself against malware and reduce the potential for re-infection:Ľ Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a sm÷rgňsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Ľ Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 Overheated90

Overheated90
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:07 AM

Posted 01 August 2010 - 04:30 AM

Hey,


Thank you for all the information, lets pray there will be no damage from the hacker,

I guess the topic can be closed,


Thanks again for everything!,


,,Overheated90




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users