Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

eset found php/ircbot.nal - what could it have accessed


  • Please log in to reply
5 replies to this topic

#1 websitewendy

websitewendy

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:23 AM

Posted 07 March 2012 - 01:39 AM

eset is still running but it has found
php/ircbot.nal
i have found this as a description and it is obviously freaking me out.

Win32.IRCBot.NAL is a malicious spyware virus which uses malignant tricks to download malicious malware from the Internet. Win32.IRCBot.NAL opens up firewalls and collects confidential information such as personal financial information. Win32.IRCBot.NAL also downloads additional components before the hackers get the remote access to the infected PC. Win32.IRCBot.NAL definitely has an identified security risk and you need to remove Win32.IRCBot.NAL immediately while you detect it.


I intend to reformat, but am concerned about what it may have sent out already..
any insight appreciated .. as to things like should i have my credit card numbers and bank accounts changed

important* i also use firefox password manager, with a master password .. what is the likelihood it has all of the passwords stored in there ?
if that isn't likely, if i change the master password using a different computer.. will that help ?

thank you

I forgot to note..
windows 7 .. 64 bit
mbam / prevxx / eset

Edited by websitewendy, 07 March 2012 - 01:47 AM.


BC AdBot (Login to Remove)

 


#2 websitewendy

websitewendy
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:23 AM

Posted 07 March 2012 - 03:17 AM

sorry for the multiple posts..
i am still the newest post in this forum, so i hope it isn't technically bumping.

.. the scan just ended and this was the location of the trojan

C:\$RECYCLE.BIN\S-1-5-21-572324174-62406800-1449895420-1000\$RC4UIQV.txt
PHP/IRCBot.NAL trojan cleaned by deleting - quarantined


that just means that it deleted it and now I can permanently delete it, right ?

why wouldn't it show me the original location the file was found ?
I tried finding it in the recycle bin to see if i could see what date it was placed there, and it is not there.

#3 websitewendy

websitewendy
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:23 AM

Posted 07 March 2012 - 05:16 PM

again, not trying to bump .. just adding more information.
I have completely reformatted using the 'recovery' system from my HP computer.
i know at least some data was compromised, as one of my credit card companies called this morning indicating my card had been used last night fraudulently.
i have subsequently closed all checking/cc accounts to start that fresh..
my main concerns now..

1. could the trojan have gotten into the recovery partition and been resinstalled ? (eset does not find it or anything after the fresh reformat)

2. many of my sync logins were outdated .. i have changed the rest of my passwords but i am still curious about the sync security in situations like this

3. since i only did a system 'recovery' using the recovery partition, should i be concerned that the trojan is still in the system somehow ?

thank you all for your time and contributions to this community.

wendy

Edited by websitewendy, 08 March 2012 - 12:19 PM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:23 AM

Posted 08 March 2012 - 10:12 PM

Hello, it is hard for me to say what exactly it sent from your PC.



backdoor Trojans, Botnets, and IRC Bots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker.


If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
What Should I Do If I've Become A Victim Of Identity Theft?
Identity Theft Victims Guide - What to do


Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

When should I re-format? How should I reinstall?
Help: I Got Hacked. Now What Do I Do?
Where to draw the line? When to recommend a format and reinstall?



Caution: If you are considering backing up data and reformatting, keep in mind, with a Virut infection, there is always a chance of backed up data reinfecting your system. If the data is that important to you, then you can try to salvage some of it but there is no guarantee so be forewarned that you may have to start over again afterwards if reinfected by attempting to recover your data. Only back up your important documents, personal data files, photos to a CD or DVD drive, not a flash drive or external hard drive as they may become compromised in the process. The safest practice is not to backup any executable files (*.exe), screensavers (*.scr), autorun (.ini) or script files (.php, .asp, .htm, .html, .xml ) files because they may be infected by malware. Avoid backing up compressed files (.zip, .cab, .rar) that have executables inside them as some types of malware can penetrate compressed files and infect the .exe files within them. Other types of malware may even disguise itself by hiding a file extension or adding to the existing extension as shown here (click Figure 1 to enlarge) so be sure you look closely at the full file name. If you cannot see the file extension, you may need to reconfigure Windows to show file name extensions. Then make sure you scan the backed up data with your anti-virus prior to to copying it back to your hard drive.

If your CD/DVD drive is unusable, another word of caution if you are considering backing up to an external usb hard drive as your only alternative. External drives are more susceptible to infection and can become compromised in the process of backing up data. I'm not saying you should not try using such devices but I want to make you aware of all your options and associated risks so you can make an informed decision if its worth that risk.Again, do not back up any files with the following file extensions: exe, .scr, .ini, .htm, .html, .php, .asp, .xml, .zip, .rar, .cab as they may be infected.

If you're not sure how to reformat or need help with reformatting, please review:These links include step-by-step instructions with screenshots:Vista users can refer to these instructions:Don't forget you will have to go to Microsoft Update and apply all Windows security patches after reformatting.

Note: If you're using an IBM, Sony, HP, Compaq or Dell machine, you may not have an original XP CD Disk. By policy Microsoft no longer allows OEM manufactures to include the original Windows XP CD-ROM on computers sold with Windows preinstalled. Instead, most computers manufactured and sold by OEM vendors come with a vendor-specific Recovery Disk or Recovery Partition for performing a clean "factory restore" that will reformat your hard drive, remove all data and restore the computer to the state it was in when you first purchased it. See Technology Advisory Recovery Media. If the recovery partition has become infected, you will need to contact the manufacturer, explain what happened and ask them to send full recovery disks to use instead..

If you need additional assistance with reformatting or partitioning, you can start a new topic in the Operating Systems Subforums forum. {Thanks to quietman7}
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 websitewendy

websitewendy
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:04:23 AM

Posted 09 March 2012 - 04:17 PM

all i can say, is.. thank you for notifying me of the possibility of the router being hacked.
it was.

what a mess.

thanks again

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:23 AM

Posted 09 March 2012 - 11:25 PM

You're very welcome Wendy :thumbup2:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users