Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

SMTP and HTTPS connections at startup...


  • This topic is locked This topic is locked
13 replies to this topic

#1 crashtest01

crashtest01

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 12:35 PM

Hi there, i've smtp connections created at random (typically at boot), and https connections to 204.45.119.2 that I've no idea what for...rootkit/virus?
If I kill the connection another appears i its place, to a different destination.

I've researched previous postings and followed the process and methods but still the issues persist. Having a nosebleed and no hair left can anyone guide me to fixing this?

I have ready:

Superantivirus
Combofix
Malware MBAM
Curports
Bitdefender Antirootkit
Hijackthis

have tried: most online virus chekers, MS One, Trend etc.

Any takers?

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:47 AM

Posted 24 August 2010 - 01:10 PM

What thise numers correlate to iis a backdoor trojan. See ThreatExpert

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 01:46 PM

thanks for the reply, I'd like to attempt to rid this backdoor.

To manage the HTTPS - After boot I can kill the process then kill the tcp connection.
To manage the SMTP - firewall blocks all in/out

I don't think anything else is at risk, or rather I don't see any transmission lights flashing on my modem.

Is there a set process ?

#4 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 01:52 PM

Errr...i should add there's no clean image and of course all information's important.

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:47 AM

Posted 24 August 2010 - 03:23 PM

Can we run these as I want to look for something
>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.

RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply
Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.


b]Rerun MBAM (MalwareBytes) like this:[/b]

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Now do an Onlinr scan with ESET
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Export to text file... to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Eset Smart Installer icon on your desktop.
  • Check the "YES, I accept the Terms of Use"
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push "List of found threats"
  • Push "Export to text file", and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the "<<Back" button.
  • Push Finish
In your next reply, please include the following:
  • Eset Scan Log


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 03:49 PM

ok upto here... should I already be in safe mode?

"After scan click Remove Selected, Post new scan log and Reboot into normal mode."

#7 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 03:51 PM

RKILL results


This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Owner on 25/08/2010 at 6:40:40.

Processes terminated by Rkill or while it was running:

C:\Documents and Settings\Owner\Desktop\rkill.scr

Rkill completed on 25/08/2010 at 6:40:43.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:47 AM

Posted 24 August 2010 - 04:05 PM

Yes if still in safe mode run MBAM
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 06:35 PM

3 Threats found and removed.

C:\Documents and Settings\Owner\Application Data\Thunderbird\Profiles\6hxck6cv.default\Mail\Local Folders\Inbox HTML/Phishing.gen trojan contained infected files
C:\QooBox\Quarantine\C\Documents and Settings\NetworkService\Application Data\Bitrix Security\eghwz0.dll.vir Win32/AutoRun.Spy.Ambler.BZ worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4E68D3ED-F57E-4552-897C-E2AD58FA30E5}\RP1\A0000086.dll Win32/AutoRun.Spy.Ambler.BZ worm cleaned by deleting - quarantined

===================

Trouble is, the naughty connections are still persisting...I haven't rebooted yet..

svchost.exe 816 TCP 1685 192.168.15.101 443 https 204.45.121.42 . Sent C:\WINDOWS\System32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5512 (xpsp.080413-2111) Microsoft Corporation 25/08/2010 6:39:34 AM NT AUTHORITY\SYSTEM A 25/08/2010 9:29:59 AM C:\WINDOWS\System32\svchost.exe
services.exe 460 TCP 1053 192.168.15.101 80 http 204.45.119.34 . Close Wait C:\WINDOWS\system32\services.exe Microsoft® Windows® Operating System Services and Controller app 5.1.2600.5755 (xpsp_sp3_gdr.090206-1234) Microsoft Corporation 25/08/2010 6:37:27 AM NT AUTHORITY\SYSTEM Eventlog, PlugPlay A 25/08/2010 9:29:59 AM C:\WINDOWS\system32\WININET.dll

#10 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 06:40 PM

after reboot...connections are still there...


services.exe 460 TCP 1026 192.168.15.101 25 smtp 91.198.174.5 lists.wikimedia.org Sent C:\WINDOWS\system32\services.exe Microsoft® Windows® Operating System Services and Controller app 5.1.2600.5755 (xpsp_sp3_gdr.090206-1234) Microsoft Corporation 25/08/2010 9:34:18 AM NT AUTHORITY\SYSTEM Eventlog, PlugPlay A 25/08/2010 9:34:31 AM

Unknown 0 TCP 1025 192.168.15.101 80 http 208.80.152.2 rr.pmtpa.wikimedia.org Time Wait N/A 25/08/2010 9:34:31 AM

services.exe 460 TCP 1039 192.168.15.101 25 smtp 74.125.148.14 s9b2.psmtp.com Sent C:\WINDOWS\system32\services.exe Microsoft® Windows® Operating System Services and Controller app 5.1.2600.5755 (xpsp_sp3_gdr.090206-1234) Microsoft Corporation 25/08/2010 9:34:18 AM NT AUTHORITY\SYSTEM Eventlog, PlugPlay A 25/08/2010 9:35:30 AM

#11 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 24 August 2010 - 06:41 PM

and the HTTPS connection

svchost.exe 976 TCP 1066 192.168.15.101 443 https 64.191.53.37 lesia.willianmathesecur.net Sent C:\WINDOWS\system32\svchost.exe Microsoft® Windows® Operating System Generic Host Process for Win32 Services 5.1.2600.5512 (xpsp.080413-2111) Microsoft Corporation 25/08/2010 9:36:15 AM NT AUTHORITY\SYSTEM A 25/08/2010 9:38:29 AM C:\WINDOWS\System32\svchost.exe

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:47 AM

Posted 24 August 2010 - 07:51 PM

Ok, this is most likely an active rootkit, rather than scan for it here and then move,let's do this.

Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9,which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If Gmer won't run,skip it and move on.
Include a copy of your ComboFix scan.
Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 crashtest01

crashtest01
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:02:47 AM

Posted 25 August 2010 - 06:53 AM

Hi Boopme, I've just dropped the logs into the new forum, title: Active Rootkit - needs love.

Many thanks for your help thus far.

BTW - the rootkit, or rather my machine went mad creating connections when I attempted to download GMER

Cheers.

#14 Pandy

Pandy

    Bleepin' Panda


  • Members
  • 9,562 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:47 AM

Posted 25 August 2010 - 08:14 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/topic342712.html you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Do not anticipate trouble, or worry about what may never happen. Keep in the sunlight.

Hide not your talents. They for use were made. What's a sundial in the shade?

~ Benjamin Franklin

I am a Bleeping Computer fan! Are you?

Facebook

Follow us on Twitter





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users