First time posting on such a site but at my wits end. At work our IP has been blocked by the CBL for sending spam. The information provided by them is below.
I am trying to diagnose which computer on my LAN is infected as i have tried blocking this on the firewall side with no luck. I was wondering if someone could assist with which app to run to try and track the machine?
I have started running combo-fix on all of the computers in the hope it will help but completely lost as to where to go with this one.
I would really appreciate any assistance.
This was detected by observing this IP attempting to make contact to a Torpig Command and Control server at '22.214.171.124' (may be missing) on IP address 80, with contents unique to Torpig C&C command protocols.
Torpig is a banking trojan, specializing in stealing personal information (passwords, account information, etc) from interactions with banking sites.
Torpig is normally dropped by Mebroot. Mebroot is a Rootkit that installs itself into the MBR (Master Boot Record).
With Mebroot or any other rootkit that installs itself into the MBR, you will either have to use a "MBR cleaner" or reformat the drive completely - even if you manage to remove Torpig, the MBR infection will cause it to be reinfected again.
The best way to find the machine responsible is to look for connections to the Torpig C&C server. This detection was made through a connection to 80, but may change periodically. To find these infections, we suggest you search for TCP/IP connections in the following ranges too:CIDR format Range format 126.96.36.199/32 188.8.131.52 184.108.40.206/32 220.127.116.11 18.104.22.168/32 22.214.171.124 126.96.36.199/32 188.8.131.52 184.108.40.206/32 220.127.116.11
usually destination port 80 or 443, but you should look for all ports. This detection corresponds to a connection at 2013-07-09 22:09:19 (GMT - this timestamp is believed accurate to within one second).
You can try Kaspersky's TDSSKiller Antirootkit Utility to get this infection detected/removed. However, we strongly recommend you to do completely re-install your operation system to get this infection removed permanently
These infections are rated as a "severe threat" by Microsoft. It is a trojan downloader, and can download and execute ANY software on the infected computer.
You will need to find and eradicate the infection before delisting the IP address.
We strongly recommend that you DO NOT simply firewall off connections to the sinkhole IP addresses given above. Those IP addresses are of sinkholes operated by malware researchers. In other words, it's a "sensor" (only) run by "the good guys". The bot "thinks" its a command and control server run by the spambot operators but it isn't. It DOES NOT actually download anything, and is not a threat. If you firewall the sinkhole addresses, your IPs will remain infected, and they will STILL be delivering your users/customers personal information, including banking information to the criminal bot operators.
If you do choose to firewall these IPs, PLEASE instrument your firewall to tell you which internal machine is connecting to them so that you can identify the infected machine yourself and fix it.
We are enhancing the instructions on how to find these infections, and more information will be given here as it becomes available.
Virtually all detections made by the CBL are of infections that do NOT leave any "tracks" for you to find in your mail server logs. This is even more important for the viruses described here - these detections are made on network-level detections of malicious behaviour and may NOT involve malicious email being sent.
This means: if you have port 25 blocking enabled, do not take this as indication that your port 25 blocking isn't working.
The links above may help you find this infection. You can also consult Advanced Techniques for other options and alternatives. NOTE: the Advanced Techniques link focuses on finding port 25(SMTP) traffic. With "sinkhole malware" detections such as this listing, we aren't detecting port 25 traffic, we're detecting traffic on other ports. Therefore, when reading Advanced Techniques, you will need to consider all ports, not just SMTP.