Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Operation Global III - Australian Variant


  • This topic is locked This topic is locked
3 replies to this topic

#1 Peter Hart

Peter Hart

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 25 October 2015 - 09:16 PM

My logs are posted on the other forum as attached.

 

http://www.bleepingcomputer.com/forums/t/594379/operation-global-3-au-variant/

 

At this stage I am looking for any solutions no matter how weird or wonderful in halting the virus from restarting itself. There are three components that I have identified however there must be a fourth some place that I have missed that keeps bringing this ransomware back to haunt me each time.

 

I will accept all newcomers however please be aware that we have already ran multiple Virus, Malware, rootkit scanners over the system as both bootable and non bootable tools. I am also if fast enough able to capture and lock down the exe files within task manager upon startup and kill the processes. This however only lasts until it reappears at which case I have to log in and do it all over again.

 

There is also the matter of the files that are encrypted that have had the virus then injected into them(probably wrapped around them now I am thinking about it). According to Nathan Scott, one of the forum security experts, the decryption key is stored with each file and so therefore should be able to be reverse engineered. If anyone has a copy of the Australian version of his decryption patch I will be your biggest fan for a very long time yet.

 

Any help you can provide would be fantastic.

 

-- Peter



BC AdBot (Login to Remove)

 


#2 CodeSmasha

CodeSmasha

  • Banned
  • 524 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:27 AM

Posted 25 October 2015 - 09:21 PM

I have my Bitdefender Rescue Disk sitting right next to me just in case.



#3 Peter Hart

Peter Hart
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 25 October 2015 - 09:24 PM

Sadly already ran this tool over the system with no luck.

 

EDIT: Sorry to clarify. Ran the tool over the system. It found the three parts of the malware I have already identified and removed them as well as their associated registry keys and the duplicate file sitting in the SYSWOW64 folder. Less than an hour back into normal operation it reared its ugly head even while disconnected from the network.


Edited by Peter Hart, 25 October 2015 - 09:26 PM.


#4 Queen-Evie

Queen-Evie

    Official Bleepin' G.R.I.T.S. (and proud of it)


  • Members
  • 16,485 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:My own little corner of the universe (somewhere in Alabama). It's OK, they know me here
  • Local time:05:27 PM

Posted 25 October 2015 - 09:56 PM

You have posted logs in the Malware Removal Logs forum.  Because you posted logs there

Please refrain from asking for further help from other members or staff until the Malware Removal Team has checked your posted log. The Malware Removal Team work very hard to investigate a unique solution to your problem and you will receive individual expert assistance. This takes time and effort so we ask you to please be patient while waiting for assistance and NOT to make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member. Any modifications you make on your own can result in system changes which may not show it the log you already posted. Further, following advice outside of that post may cause confusion for the team member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

The Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean. If you followed any other advice already, please ensure you inform the Malware Removal Team Team Helper when they respond to assist you with your log. This will help them know what has been done and they probably will ask for an updated log.
 
Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible.

If HelpBot replies to your topic, please follow Step One so it will report your topic to the team members.

Malware Removal Logs topics take precedence over all other forums.
To avoid confusion, this topic is closed.

Edited by Queen-Evie, 25 October 2015 - 09:59 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users