Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

backdoor.sheedash!inf


  • Please log in to reply
5 replies to this topic

#1 bobfelt

bobfelt

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:57 PM

Posted 04 November 2010 - 12:08 PM

Unable to remove this virus either auto or manual. Tried with norton 360, antimalware, superantimalware,rkil, in both regular and sfe mode. Info about this virus seems to be limited. Backdoor.sheedash!inf says it is a detector for backdoor.sheedash. It's hiding in sfcfiles.dll.vir and is located in c:\Qoobox\quarantine\c\windows\system32\sfcfiles.dll.vir. Have searched everywhere that i know based on my limited knowledge with no luck. my comp tends to slow down and have trouble downloading some web sites sometimes especially when i open multiple tabs on the ie. i get no other indications that the virus is there except when i run virus scan. the other scanners don't even see it. i recieve no error messages. the only thing i am told to do is go to nortons website for manual removal and it states that it's supposed to be easy to remove.not! Its been in my computer for two weeks now. Last thing i tried was to downlowd an adware removal and it would not let me indicating improperly set security settings which appeared to be ok. thanks i hope, bob
p.s. i use xp

Edited by bobfelt, 04 November 2010 - 02:04 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:57 PM

Posted 04 November 2010 - 11:56 PM

Hello and welcome. backdoor.sheedash!inf is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall



Please download the Kaspersky Virus Removal Tool save to your Desktop.
Be sure to print out and read the instructions provided in How to use Kaspersky virus removal tool.
  • Double-click the setup file (i.e. setup_7.0.0.290_24.06.2009_12-58.exe) to install the utility.
  • If using Vista, right-click on it and Run As Administrator.
    If you receive a UAC prompt asking if you would like to continue running the program, you should press the Continue button.
    .
  • Click Next to continue.
  • It will install by default to your desktop folder. Click Next.
  • Click Ok at the prompt for scanning in Safe Mode if you booted into safe mode.
  • A box will open with a tab that says Automatic scan.
  • Under Automatic scan make sure these are checked.
  • System Memory
  • Startup Objects
  • Disk Boot Sectors
  • My Computer
  • Any other drives (except CD-ROM drives)
  • Click on the Scan button.
  • If malware is detected, place a checkmark in the Apply to all box, and click the Delete button (or Disinfect if the button is active).
  • After the scan finishes, if any threats are left unneutralized in the Scan window (Red exclamation point), click the Neutralize all button.
  • In the window that opens, place a checkmark in the Apply to all box, and click the Delete button (or Disinfect if the button is active).
  • If advised that a special disinfection procedure is required which demands system reboot, click the Ok button to close the window.
  • In the Scan window click the Reports button, name the report AVPT.txt and select Save to file.
  • This tool should uninstall when you close it so please save the report log before closing.
  • When done, close the Kaspersky Virus Removal Tool.
  • You will be prompted if you want to uninstall the program. Click Yes.
  • You will then be prompted that to complete the uninstallation, the computer must be restarted. Select Yes to restart the system.
  • Copy and paste only the first part of the report (Detected) in your next reply. Do not include the longer list marked Events.
-- If you cannot run the Kaspersky AVP Removal Tool in normal mode, then try using it in "safe mode".
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 bobfelt

bobfelt
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:57 PM

Posted 05 November 2010 - 06:14 PM

This is the report after the removal tool had completed. i hope this is good news. ihope i did this right.



Autoscan: completed 4 hours ago (events: 50, objects: 430621, time: 02:51:29)
11/5/2010 11:06:53 AM Task started
11/5/2010 11:33:23 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe
11/5/2010 11:33:24 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe
11/5/2010 11:33:24 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe
11/5/2010 11:33:24 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe
11/5/2010 11:33:25 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe
11/5/2010 11:33:25 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe
11/5/2010 11:33:26 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe
11/5/2010 11:33:26 AM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe
11/5/2010 12:53:05 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe
11/5/2010 12:53:06 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe
11/5/2010 12:53:06 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe
11/5/2010 1:52:27 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe
11/5/2010 1:53:36 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe
11/5/2010 1:53:36 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe
11/5/2010 1:54:39 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe
11/5/2010 1:54:39 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe
11/5/2010 1:55:22 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe
11/5/2010 1:55:22 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe
11/5/2010 1:55:37 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe
11/5/2010 1:55:37 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe
11/5/2010 1:56:57 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe
11/5/2010 1:56:57 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe
11/5/2010 1:57:15 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe
11/5/2010 1:57:16 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe
11/5/2010 1:58:12 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe
11/5/2010 1:58:12 PM Detected: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe
11/5/2010 1:58:22 PM Deleted: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe
11/5/2010 1:58:23 PM Task completed
11/5/2010 11:33:23 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe Postponed
11/5/2010 11:33:24 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe Postponed
11/5/2010 11:33:24 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe Postponed
11/5/2010 11:33:24 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe Postponed
11/5/2010 11:33:25 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe Postponed
11/5/2010 11:33:25 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe Postponed
11/5/2010 11:33:26 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe Postponed
11/5/2010 11:33:26 AM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\AppRecoveryLink_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CDLogic_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\CreatorLink_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RestoreLink_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RTCDLink_ret.exe Postponed
11/5/2010 12:53:05 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\RunLink_ret.exe Postponed
11/5/2010 12:53:06 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\SysRecoveryLink_ret.exe Postponed
11/5/2010 12:53:06 PM Untreated: Trojan-Spy.Win32.Agent.bdrd C:\hp\recovery\wizard\fscommand\WizardLink_ret.exe Postponed
Autoscan: completed 14 minutes ago (events: 5, objects: 265387, time: 02:35:52)
11/5/2010 3:07:50 PM Task started
11/5/2010 4:18:23 PM Detected: Trojan.JS.Fraud.ap Outlook\Personal Folders\Top of Personal Folders\Deleted Items\[From:Stefanie Mcrae][Subject:Resume][Time:2010/08/19 05:46:03]/Resume.html
11/5/2010 5:43:42 PM Task completed
11/5/2010 4:18:24 PM Untreated: Trojan.JS.Fraud.ap Outlook\Personal Folders\Top of Personal Folders\Deleted Items\[From:Stefanie Mcrae][Subject:Resume][Time:2010/08/19 05:46:03]/Resume.html Postponed
11/5/2010 4:41:40 PM Processing error C:\Documents and Settings\Owner\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Read error

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:57 PM

Posted 05 November 2010 - 07:19 PM

Hi something went sideways :thumbsup: Looks like we did not get a full log for some reason. Also did you select CURE ??
Run again please.
Do you still have a ComboFix log? When did you run it?

Please Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 bobfelt

bobfelt
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:12:57 PM

Posted 05 November 2010 - 07:39 PM

My apologies to boopme. i am confused. was your reply to me on this topic or somebody elses? the things you are asking me to do now are not what you had me do earlier. is this something new you want me to do? bob
P.S.this was a log from kaspersky

Edited by bobfelt, 05 November 2010 - 07:40 PM.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:57 PM

Posted 05 November 2010 - 07:58 PM

Hi my bad that was the Kaspersky log, I was thing of another... this one...


Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


But I did want this.

Do you still have a ComboFix log? When did you run it?

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


EDIT: on KASP find; Trojan-Spy.Win32.Agent.bdrd
The Trojan tracks which Internet sites are visited, and also logs keystrokes

Edited by boopme, 05 November 2010 - 08:07 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users