Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I unzipped a voicemail in my junk mail...wolf in sheep clothing???


  • This topic is locked This topic is locked
4 replies to this topic

#1 mrbushtroll

mrbushtroll

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 30 January 2015 - 06:16 AM

Ok

feeling real darn noob

 

I got a unusual voice mail attachment in my junk mail. it was zipped

never seen that before....but as a small business dude

it could be client sending me info

 

so i unzip...it briefly turns into a xxxxxxxx.scr (thinking screen saver file) and disappears

no voice file at all. ok batman what happened??

 

return  to desk top.....no back ground

black......go to use my firefox to use check websites...passwords gone

go to open pdf on desk top....says damaged or corrupt

so i open some folders up on desk top....

there is help_decrypt txt file and a help_decrypt png

look at png file...it says some thing about pay money to decrypt files

 

ok i look this up on internet....while  i do a deep mcafee plus deep scan.....it never caught anything....

ok....i am lead to this site associated with mcafee

 

seems i may have crypto 3.0??? or a ransom virus ICE thingy

do some reading

purchase spyhunter 4...install and scan deeply.....

and download macfee stinger

start  to delete every help_decrypt txt file and a help_decrypt png i can find...plus another info.txt...which is gibberish in view screen

 

ok spyhunter finds several malware....fix

check pdfs and jpegs...some don't work....screw it delete them......ok seems  everything is fine

stinger comes up clean

 

ok next morning.....remembering passwords to different accounts...pdfs working

find a folder with help_ decrypt stuff in it....screw it delete folder

do another mcafee scan, stinger, malwarebytes anti malware and spyhunter 4

only thing that comes up

spyhunter 4

media infections (cookie trackers) 4 infections listed files

_ga.9DI6DP87.txt

_gat.9DI6DP87.txt

azk.JERHWVJG.txt

azk-events.JERHWVJG.txt

 

ok fix.....scan with the whole army

nothing

pdf that are ok act dead

scan

spyhunter 4

media infections (cookie trackers) 4 infections listed files

_ga.9DI6DP87.txt

_gat.9DI6DP87.txt

azk.JERHWVJG.txt

azk-events.JERHWVJG.txt

 

ok what have i missed.....trying mcafee Getsusp

says 1 suspicious file and 3 unknown

scan results uploaded to mcafee labs.

i up load file anyways to mcafee labs to be sure

 

also malwarebytes finds 2 potentially objects....this time...not last times  and then 5???

PUP.Optional.searchProtect.A ----- temp\utt5E9C.tmp.exe

PUP.Optional.Trovi.A ------ searchplugins\trovi-search.xml

so i delete them

 

and scan again

 

how do i kill it

or do i nuke and pave

plus my external drives....do they have it......malwarebytes..... does it scan all....no way i see to check

does the more i scan the more it spreads

 

GGGGRRRRRRRRRR

time for some peer support....so i'm asking...email me.....i will try anything

 



BC AdBot (Login to Remove)

 


#2 mrbushtroll

mrbushtroll
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 30 January 2015 - 06:17 AM

McAfee® Labs Stinger™ Version 12.1.0.1314 built on Jan 29 2015 at 14:17:43

Copyright© 2014, McAfee, Inc. All Rights Reserved.

 

AV Engine version v5700.7163 for Windows.

Virus data file v1000.0 created on Jan 29, 2015

Ready to scan for 6682 viruses, trojans and variants.

Custom scan initiated on Thursday, January 29, 2015 17:04:39

 

Rootkit scan result : Not Scanned.

 

Summary Report on C:

D:

E:

F:

G:

H:

I:

File(s)

TotalFiles:............ 1858282

Clean:................. 339012

Not Scanned:........... 1519270

Possibly Infected:..... 0

Time: 11:04:21

Scan completed on Friday, January 30, 2015 04:09:00

 

now here i thought it would do all drives????

will do again...and external only



#3 mrbushtroll

mrbushtroll
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 30 January 2015 - 08:16 AM

some extra info

one file is firefox email browser link

HELP_DECRYPT

the info is --- http://paytoc4gtpn5czl2.monsterbbc.com/dj9tgp

 

 

http://i60.tinypic.com/2uy1tu9.jpg



#4 mrbushtroll

mrbushtroll
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:45 AM

Posted 30 January 2015 - 08:55 AM

was to system restore

so only restore point was day and a half ago

 

done

now the big question.....did it die

how do i find out......

 

if my externals hard drives are infected.....how do i know....how do i clean them

 

not impressed had a system restore point from weeks ago...after a computer system tune up and nuke and pave

its gone

 

am i winning......guessing that i'm even on the playing field chasing a ghost...or figment of my imagination

 

going to test cryptowall 3.0 decrypter.....saw it some where on bleedingcomputer or macfree....geeksomething

 

0% 20% 50% 100%.......can't even guess......to me its yes or no......not like one can get a blood sample and you clean...or can ya



#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,726 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:45 AM

Posted 30 January 2015 - 09:38 AM


A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CryptoWall & CryptoWall 2.0 does and provide information for how to deal with it and possibly decrypt/recover your files. Cryptowall typically deletes all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore or using a program like Shadow Explorer...but it never hurts to try. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

CryptoWall 3.0 uses its new TOR gateways and has an extended deadline to pay the ransome...
see After a brief hiatus malware developers release CryptoWall 3.0.

There is also a lengthy ongoing discussion in this topic: CryptoWall - new variant of CryptoDefense Support & Discussion Topic.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users