Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32/Zbot.E


  • This topic is locked This topic is locked
2 replies to this topic

#1 sonyu66

sonyu66

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:09 AM

Posted 02 November 2010 - 07:34 PM

I have a dell dimension 3000 with windows xp home edition ,AVG resident shield alert has identified multiple files that are infected the virus it says is " Win32/Zbot.E " it also has another one that says " VBS/Generic " .
I am not sure what happen i was updating AVG to the 2011 update, and now this, if someone can help me out with this .
Thanks.
I just looked in the AVG event history and this is what it says.

"11/2/2010, 12:11:28 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is starting."

"11/2/2010, 12:11:31 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is running."

"11/2/2010, 12:23:59 PM";"NT AUTHORITY\SYSTEM";"IDP";"Process SUOKZ.EXE was detected."

"11/2/2010, 5:27:34 PM";"GHOST\Sony U";"Update";"Update was started."

"11/2/2010, 5:29:11 PM";"NT AUTHORITY\SYSTEM";"IDP";"Process SUOKZ.EXE was quarantined."

"11/2/2010, 5:30:11 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is stopping."

"11/2/2010, 5:30:14 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is stopped."

"11/2/2010, 5:32:11 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is starting."

"11/2/2010, 5:32:27 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is running."

"11/2/2010, 5:34:03 PM";"NT AUTHORITY\SYSTEM";"Update";"Update was started."

"11/2/2010, 5:37:09 PM";"NT AUTHORITY\SYSTEM";"Update";"Update failed."

"11/2/2010, 5:54:05 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is stopping."

"11/2/2010, 5:54:06 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is stopped."

"11/2/2010, 5:55:52 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is starting."

"11/2/2010, 5:56:06 PM";"NT AUTHORITY\SYSTEM";"General";"AVG is running."

"11/2/2010, 5:58:18 PM";"NT AUTHORITY\SYSTEM";"IDP";"Process SYSQGV32.EXE was detected."

"11/2/2010, 6:12:54 PM";"NT AUTHORITY\SYSTEM";"IDP";"Process SYSQGV32.EXE was quarantined."

Edited by sonyu66, 02 November 2010 - 07:55 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:09 AM

Posted 02 November 2010 - 10:27 PM

Hello ,I'm afraid I have very bad news.

Win32/Zbot and VBS/Generic are names used by AVG forWin32/Ramnit.A / Win32/Ramnit.B are file infectors with IRCBot functionality which infects .exe, and .HTML/HTM files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. The infected .HTML or .HTM files may be detected as The infected .HTML or .HTM files may be detected as Virus:VBS/Ramnit.A or VBS/Generic. Win32/Ramnit.A!dll is a related file infector often seen with this infection. It too has IRCBot functionality which infects .exe, .dll and .HTML/HTM files and opens a back door that compromises your computer. This component is injected into the default web browser by Worm:Win32/Ramnit.A which is dropped by a Ramnit infected executable file.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.With this particular infection the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.

Why? The malware injects code in legitimate files similar to the Virut virus and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of damage can vary.

Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

In my opinion, Ramnit is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Security vendors that claim to be able to remove file infectors cannot guarantee that all traces of it will be removed as they may not find all the remnants. If something goes awry during the malware removal process there is always a risk the computer may become unstable or unbootable and you could loose access to all your data.

Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system

Backdoors and What They Mean to You

This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 sonyu66

sonyu66
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:09 AM

Posted 03 November 2010 - 08:00 AM

Hi thanks for your reply I was afraid it would come to reformatting .
If there is anything else that can be done let me know, I am at work right now so I will be tackling this when I get home.
Thanks .

Mod Edit: Closed to avoid confusion: Duplicate thread here.

Edited by quietman7, 03 November 2010 - 08:14 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users