Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit on Windows Server 2008 (Port Scanning Network)


  • This topic is locked This topic is locked
5 replies to this topic

#1 aznspy256

aznspy256

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NYC
  • Local time:04:21 PM

Posted 19 March 2014 - 11:50 AM

Greetings Bleeping Computer community!

I have a major issue on the computer I work with. I just got this job about a month ago and I found out I inherited a problem from the last IT guy. I'm still a student working on my BTech degree so my knowledge is limited. Also I'm the only guy helping with the computers so there's nobody to help me.

Since I started working here, we have a couple employees complaining how the database software keeps crashing. The error that pops up is a network issue. So I check the log files of ESET antivrus firewall and it shows the servers ip port scanning the machine. The server consist of two HDs, one for the primary OS and another for storage for the network. I ran a malwarebytes scan on the Server and located a couple malicious files on the D drive. It was keygens that the last IT guy downloaded o.O So I removed them with MalwareBytes and I thought that did the job but boy was I wrong. The server has the BSOD so I had to uninstall MalwareBytes in order for the server to logon. Next, the portscans are still coming and crashing the database for some users. I think I have found the process that does the portscans which is svchost.exe. This leads me to believe that the server is infected with a rootkit which is maintaining access and has altered the antivirus and firewall to dial home and maint access on the server. I have already ran rootkit scanners such as tdskiller and bootkitremoval with no avail. Please advise on what I should do. Please note that the server must be kept on for employees during work days and hours. Thank you in advance for your expertise.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,440 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:21 PM

Posted 19 March 2014 - 12:51 PM

Hello we need to repost this with a DDS log from this guide.

Please follow this Preparation Guide, do steps 6,7 and 8 and post in a new topic.
Let me know if all went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 aznspy256

aznspy256
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NYC
  • Local time:04:21 PM

Posted 19 March 2014 - 01:56 PM

Thank you for the reply boopme. A problem that I encountered following your steps was that dds.exe does not support my OS. Is there another software I can run that supports windows server 2008?


Edited by aznspy256, 19 March 2014 - 02:16 PM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,440 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:21 PM

Posted 19 March 2014 - 02:20 PM

OK, If you cannot get DDS to work, please try this instead.

Please download RSIT by random/random from the link provided for your operating system and save it to your desktop.This tool needs to run while the computer is connected to the Internet. If you get a warning from your firewall or other security programs regarding RSIT attempting to contact the Internet, please allow the connection.
  • Close all applications and windows so that you have nothing open and are at your Desktop.
  • Double-click on RSIT.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Read the disclaimer and click Continue.
  • When the scan is complete, a text file named log.txt will automatically open in Notepad.
  • Another text file named info.txt will open minimized.
  • Save the log files to your desktop and copy/paste the contents of log.txt by highlighting everything and pressing Ctrl+C.
  • After highlighting, right-click, choose Copy and then paste the contents into a new topic in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here.
  • Copies of both log files are automatically saved in the C:\RSIT folder which the tool creates during the scan.
Important: Be sure to mention that you tried to follow the Prep Guide but were unable to get DDS to run.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 aznspy256

aznspy256
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NYC
  • Local time:04:21 PM

Posted 19 March 2014 - 02:55 PM

Thank you for the help boopme. I completed the procedure that you have advised and posted a new topic on http://www.bleepingcomputer.com/forums/t/528037/rootkit-on-windows-server-2008-port-scanning-network/ . Thanks again! :love4u:



#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,612 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:21 PM

Posted 19 March 2014 - 03:09 PM


Now that your log is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Response Team member...nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log(s) you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process or make things worst which would extend the time it takes to clean your computer.

From this point on the Malware Response Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take several days to get a response because the Malware Response Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have posted your log and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Response Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Response Team member is already assisting you and not open the thread to respond.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.

To avoid confusion, I am closing this topic.

Good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users