Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

FBI Ransomware infection (latest UK version)


  • This topic is locked This topic is locked
5 replies to this topic

#1 theviolinman

theviolinman

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 02 April 2013 - 09:57 AM

I am not an expert, but the guy who helps me with my IT has told me to give you the following information:

The PC is a Dell Vostro 1700 running XP Pro SP3, which has been hijacked by the UK "Kent Police" version of the FBI Ransomware infection. This is the version that in Safe Mode puts up a white screen before any useful action can be taken.

There is an extra complication you need to be aware of on this PC: there is a separate system partition which just contains NTDETECT.COM, ntldr, and boot.ini, providing the option to boot to the main (infected) partition, or a spare boot partition, also running XP but with different apps installed for occasional use.

The main boot partition containing MS Office etc. is now unusably infected, but the PC will still boot to the alternative XP partition. However, because the trojan hides itself so well, from the usable spare partition, no anti-malware stuff (including MalwareBytes) can find any problem when scanning the the infected boot partition (or the system partition, although presumably no infection here because it still allows the second option boot).

Because the system partition is separate from the infected boot partition, HitmanPro's usually effective Kickstart can't be used because it only seems to work with a common system & boot partition.

 

 I'd be grateful for any help you can give.

 

theviolinman

 

*Moderator Edit: Moved topic from XP to the more appropriate forum. ~ Queen-Evie*

 

Mod EDIT II,you actually will need to be here "Virus, Trojan, Spyware, and Malware Removal Logs"

So I moved you ~~ boopme


Edited by boopme, 02 April 2013 - 08:13 PM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,762 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:22 PM

Posted 07 April 2013 - 10:00 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

=http://www.bleepstatic.com/images/site/icons/steps/step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/490552 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gif If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,441 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:05:22 AM

Posted 12 April 2013 - 05:51 AM

Hello, if you still need help, could you please let me know if you can boot in safe mode on the infected partition.


regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft

 

animinionsmalltext.gif


#4 theviolinman

theviolinman
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:22 AM

Posted 14 April 2013 - 03:39 PM

Hi Elise,

 

Since you may not have seen my original email, I include it below:

 

I am not an expert, but the guy who helps me with my IT has told me to give you the following information:

The PC is a Dell Vostro 1700 running XP Pro SP3, which has been hijacked by the UK "Kent Police" version of the FBI Ransomware infection. This is the version that in Safe Mode puts up a white screen before any useful action can be taken.

There is an extra complication you need to be aware of on this PC: there is a separate system partition which just contains NTDETECT.COM, ntldr, and boot.ini, providing the option to boot to the main (infected) partition, or a spare boot partition, also running XP but with different apps installed for occasional use.

The main boot partition containing MS Office etc. is now unusably infected, but the PC will still boot to the alternative XP partition. However, because the trojan hides itself so well, from the usable spare partition, no anti-malware stuff (including MalwareBytes) can find any problem when scanning the the infected boot partition (or the system partition, although presumably no infection here because it still allows the second option boot).

Because the system partition is separate from the infected boot partition, HitmanPro's usually effective Kickstart can't be used because it only seems to work with a common system & boot partition.
 


I'd be grateful for any help you can give me.

 

 

Best wishes,

 

theviolinman 

 



#5 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,441 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:05:22 AM

Posted 15 April 2013 - 02:03 AM

Can you please try to boot in Safe Mode Command prompt as well? Also, as this is XP, have you tried selecting in Safe Mode the Administrator account instead of your own?

 

Please try this as well.


regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft

 

animinionsmalltext.gif


#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,441 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:05:22 AM

Posted 19 May 2013 - 03:42 PM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft

 

animinionsmalltext.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users