Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Nasty Virus / Malware - Can't Win The Battle


  • This topic is locked This topic is locked
5 replies to this topic

#1 mr2real

mr2real

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:52 PM

Posted 27 July 2012 - 08:40 PM

Let me start be saying I've been trying to fix this computer for a friend for two weeks now. I thought it would be as simple as restoring to a factory image on the recovery partition. The friend isn't worried about losing any data because the computer became infected a few weeks after he bought it which was a couple of years ago. I've ran awsMBR and found / fixed several errors. I've also ran TDSSkiller and fixed some errors. Malwarebytes found several infected files today. I quarantine the infected files and restart / rescan and always find another rootkit. Also I did the eset online scanner and it found 4 infections (believe they were win32.tdss and win64.tdss). I believe the virus is the Alureon. Worst of all, I changed some systems file names because I thought it might help and the computer wouldn't even boot up. Long story short - pulled the hard drive, had a friend put the hard drive in an external hard drive case, accessed it on his computer to change the names back, and now his computer is infected too. I'm on the infected computer now and can provide any logs necessary. Please help!!! Thanks, Joe


Here's a log from MalwareBytes...
Malwarebytes Anti-Malware (Trial) 1.62.0.1300
www.malwarebytes.org

Database version: v2012.07.03.05

Windows Vista Service Pack 1 x86 NTFS (Safe Mode)
Internet Explorer 7.0.6001.18000
Aaron and Jason :: SCHOOLLAPTOP [administrator]

Protection: Disabled

7/27/2012 4:52:02 PM
mbam-log-2012-07-27 (16-52-02).txt

Scan type: Full scan (C:\|E:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 388527
Time elapsed: 40 minute(s), 26 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 2
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|a3395c9 (Trojan.Agent) -> Data: C:\Users\Aaron and Jason\AppData\Roaming\a3395c9\a3395c9.exe -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|a3395c9 (Trojan.Agent) -> Data: C:\Users\Aaron and Jason\AppData\Roaming\a3395c9\a3395c9.exe -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 6
C:\Users\Aaron and Jason\AppData\Roaming\a3395c9\a3395c9.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\TDSSKiller_Quarantine\27.07.2012_09.37.00\tdlfs0000\tsk0003.dta (Trojan.Agent) -> Quarantined and deleted successfully.
C:\TDSSKiller_Quarantine\27.07.2012_09.37.00\tdlfs0000\tsk0005.dta (Rootkit.Agent.Gen) -> Quarantined and deleted successfully.
C:\Users\Aaron and Jason\AppData\Local\temp\wpbt1.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Windows\Installer\{1275ff52-41a2-8249-602b-776eb539b742}\U\800000cb.@ (Rootkit.0Access) -> Quarantined and deleted successfully.
C:\Users\Aaron and Jason\AppData\Local\temp\wpbt0.dll (Exploit.Drop.GS) -> Quarantined and deleted successfully.

(end)

Edited by Orange Blossom, 27 July 2012 - 08:56 PM.
Moved from Vista to AII. ~ OB


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,912 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:52 PM

Posted 27 July 2012 - 09:33 PM

Hello,with such a deep seated Zeroaccess rootkit,beeter to repost this with a DDS log.

We need a deeper look. Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run (it may not on a 64 bit system) skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Dolby

Dolby

  • Members
  • 86 posts
  • OFFLINE
  •  
  • Local time:05:52 PM

Posted 27 July 2012 - 09:45 PM

If you reimaged/reformatted from the recovery partition, (:D) drive on my machine, & the infection was there also (which is not uncommon), then you reintroduced it back into the brand new image. WHICHEVER malware scan you run, always include that drive along with the :C drive when you set up the scan & run "full" scan. Also, if you ever use "system restore", & restore back to a point in time when there was an active malware present, (even if you had scanned & removed it later), you will also introduce it back into the system. Run everything you mentioned again, making sure you check the box for the recovery partition drive also, & run Superantispyware as well. As you explore the program, you will find a "repair" section that you can use that's supposed to fix damaged Windows components. Also there is a thing to check for "highly infected computers" that you may consider. Make sure you follow all instructions from any BC moderators that may answer this too. (I'm just a member) Good Luck

Edited by Dolby, 27 July 2012 - 09:47 PM.


#4 Dolby

Dolby

  • Members
  • 86 posts
  • OFFLINE
  •  
  • Local time:05:52 PM

Posted 27 July 2012 - 09:47 PM

Sorry about the YouTube thing - my bad - it was supposed to be this link
http://superantispyware.com/

#5 mr2real

mr2real
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:52 PM

Posted 27 July 2012 - 11:18 PM

Hello,with such a deep seated Zeroaccess rootkit,beeter to repost this with a DDS log.

We need a deeper look. Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run (it may not on a 64 bit system) skip it and move on.

Let me know if that went well.





I just finished everything except the GMER (waiting for it to finish). I went ahead and posted the DDS. Here's the new topic - http://www.bleepingcomputer.com/forums/topic462811.html . Thanks again, Joe

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,912 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:52 PM

Posted 28 July 2012 - 07:29 PM

Thank you, it is important to let our malware team remove all traces as this infection wants personal information.

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

The current wait time is 1 - 3 days and ALL logs are answered.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users