Downloader.Obfuskate virus

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by edbo20, Jul 22, 2009.

  1. edbo20

    edbo20 Corporal

    I am distraught as to why I have this virus. I used the program about two weeks ago to rid malware but now I noticed that this virus popped up in an AVG scan.

    A couple of things I need to tell you:

    1. I installed Comodo firewall and Defense + after the last READ & RUN ME effort and clean bill of health. I guess I let it in, because I don't know how to use it? Can I disable this and use Microsoft firewall until I read up on how to use Comodo?

    2. I noticed AVG was off yesterday. Don't know why. I ran a scan and the virus popped up.

    I don't surf the web with this computer. I only receive emails. Maybe it came through that way, but I usually forward "personal" emails to another computer. Go figure.

    Can you please help me determine if I need to do anything else? Thank you very much.
     

    Attached Files:

  2. edbo20

    edbo20 Corporal

    additional log

    log attached
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You will need to tell me exactly what is being reported.

    I want you to do two things:

    Use windows explorer to find and delete:
    C:\WINDOWS\isRS-000.tmp
    C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd --> if it exists.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip

     
  4. edbo20

    edbo20 Corporal

    Well, that didn't go as well as I would have liked.

    couldn't erase C:\WINDOWS\isRS-000.tmp got an error message "Cannot delete isRS-000: Access denied. Make sure the disk is not full or write protected and that the file is not currently in use."

    C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd did not exist.

    I completed the copy and save as Regedit msg as described and was successful.

    Attached is the log
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You didnt tell me what AVG is reporting.
     
  6. edbo20

    edbo20 Corporal

    I turned AVG off to run the instructions you gave me. Can you tell me what I should do now? Is there a log for AVG that you want?
     
  7. edbo20

    edbo20 Corporal

    What AVG is reporting

    This isn't a bump (I hope). I think you were asking what AVG is reporting and I think you may be asking me what I thought you knew. I guess through your supernatural powers. My fault. I'm a little slow at this stuff.

    AVG is what is reporting Downloader.Obfuskate as a virus in its scan.
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes...it may call it that but it should also tell you where it is ....a full path to it.
     
  9. edbo20

    edbo20 Corporal

    Damn! I figured that out, but I figured I shouldn't bump the thread again. I think this is what you need:

    On 7/26/09 AVG reported an infection in the virus vault called Downloader.Obfuskated with a path to file
    C:\WINDOWS\temp\33493c30-9c72-4f8c-8ae0-1f080fa703f4.tmp

    On 7/24/09 AVG reported an infection in the virus vault called Downloader.Obfuskated with a path to file
    C:\WINDOWS\temp\746cca8a-ae49-42dc-803c-bf02c6ff369d.tmp

    On 7/22/09 AVG reported an infection in the virus vault called Downloader.Obfuskated with a path to file
    C:\WINDOWS\temp\af286232-fae6-45f0-8c14-972accc66743.tmp

    I copied these by hand very carefully. I don't know of a way to get this info out of AVG virus vault in the form of a log?
     
  10. edbo20

    edbo20 Corporal

    Additional Info.

    I thought I should tell you this before you did anymore work on my file.

    In addition to the previous post on 7/28/09.

    On 7/31/09 AVG reported an infection in the virus vault called WIN32/Heur with a path to file
    C:\WINDOWS\temp\fd35f376-eb05-474f-b46d-78de47ad4804.tmp

    On 7/31/09 AVG reported an infection in the virus vault called WIN32/Heur with a path to file
    C:\WINDOWS\temp\82eaecab-cc39-4083-9432-989ba24a4dc2.tmp

    The AVG scan done that night at about the same time shows no infection (see attached). Is that because the virus was quarantined?

    I do notice a large number of temp files in the C://WINDOWS/Temp folder. Actually, I wouldn’t know what would constitutes a large number? It seems large to me?

    I do not use the computer in question to surf the web. I only take emails and forward personal emails to another computer.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\WINDOWS\Temp\0bb3f3bb-3dd7-49d4-9235-209509e594ed.tmp
    C:\WINDOWS\Temp\0d0e9166-0151-4da1-9d54-1e1f2c45e922.tmp
    C:\WINDOWS\Temp\16d17d8f-04d5-44fe-ae33-5978582ebd88.tmp
    C:\WINDOWS\Temp\18688dd5-08be-4d2a-b27b-ed63d1861a34.tmp
    C:\WINDOWS\Temp\1dc15da2-7b2a-4e2d-add0-2fab5c100d7a.tmp
    C:\WINDOWS\Temp\20ecdb46-d371-43cb-97e9-81ff296a57b5.tmp
    C:\WINDOWS\Temp\20f0c3b3-19f9-43c6-9795-baa157a1702a.tmp
    C:\WINDOWS\Temp\25318883-43dd-4ecb-b179-a2d6dfca2430.tmp
    C:\WINDOWS\Temp\2fb67045-e808-4fc9-8a5b-9ede36572afd.tmp
    C:\WINDOWS\Temp\411188dd-6431-4149-8cb0-abf9fc1b7c8f.tmp
    C:\WINDOWS\Temp\41e12271-05b5-4fb6-91c0-61a317fcbca2.tmp
    C:\WINDOWS\Temp\424a784c-2a35-40b5-953b-6ba30b53eef8.tmp
    C:\WINDOWS\Temp\4c2d7397-385a-43fb-b61e-071d5b4ce77d.tmp
    C:\WINDOWS\Temp\4cb24bd4-3067-4098-aae4-584783e00981.tmp
    C:\WINDOWS\Temp\50eb96d0-6607-4b19-ab91-3e9176596ea3.tmp
    C:\WINDOWS\Temp\511f2b14-dedd-4fac-9b5c-1dbedc701a5d.tmp
    C:\WINDOWS\Temp\56f59628-44e8-42d3-b01d-bc584b8c2f01.tmp
    C:\WINDOWS\Temp\5ff45587-e329-479b-b1db-0ba15ce59262.tmp
    C:\WINDOWS\Temp\6097b500-5b04-4e50-9fe0-c29cbad0ec6a.tmp
    C:\WINDOWS\Temp\612da0b6-573a-4199-a525-2b35f97942fa.tmp
    C:\WINDOWS\Temp\61906183-5179-4691-b9c9-f1a5ef0b3dc9.tmp
    C:\WINDOWS\Temp\638c846f-a7c6-4990-bddc-37f0dd7d58c4.tmp
    C:\WINDOWS\Temp\72f6b01e-ad65-420f-a560-698b215fd453.tmp
    C:\WINDOWS\Temp\796c3b0b-58e9-4be3-857d-67e333a51a8d.tmp
    C:\WINDOWS\Temp\79b48aa4-f3df-4393-9e3a-5a938c638947.tmp
    C:\WINDOWS\Temp\813c0b0e-6436-440b-80e4-1d32636f9e8c.tmp
    C:\WINDOWS\Temp\83c72ed4-06f0-4074-8035-7c9ffd7f562b.tmp
    C:\WINDOWS\Temp\846bf48f-49e9-4131-bc46-978642e23499.tmp
    C:\WINDOWS\Temp\864f33fc-b7ef-4af2-b3a4-a4ddf704bd27.tmp
    C:\WINDOWS\Temp\8680120b-81ae-4a9d-8633-9ef3a62ca935.tmp
    C:\WINDOWS\Temp\88922fd8-4cd8-4f25-8222-0a24518ff704.tmp
    C:\WINDOWS\Temp\8913d562-7196-4fc6-b823-11e7b6c3e0ae.tmp
    C:\WINDOWS\Temp\8c4c065b-7da3-431d-90a4-4f0b53f8bfb4.tmp
    C:\WINDOWS\Temp\8da5e5fe-dcb6-492d-89be-34c1fe8f31b9.tmp
    C:\WINDOWS\Temp\900450e7-6416-432f-b17d-15873316ee50.tmp
    C:\WINDOWS\Temp\97f6a79c-5162-46f8-86ad-32633f4d6e9a.tmp
    C:\WINDOWS\Temp\99204843-ed4f-4bb3-858e-a4c527df90a3.tmp
    C:\WINDOWS\Temp\9ad27f69-0884-4526-b594-44793e3721d3.tmp
    C:\WINDOWS\Temp\aa3c459d-2ce6-45c1-a2a4-e4bf4a84b43f.tmp
    C:\WINDOWS\Temp\b57d8e0f-9c34-44dd-86bb-3d40cdd36b98.tmp
    C:\WINDOWS\Temp\b79f5073-16fb-41ee-a686-03a135238b2a.tmp
    C:\WINDOWS\Temp\b8dfd7d8-8521-42e1-b9d5-08892c7fbe89.tmp
    C:\WINDOWS\Temp\bbde9f92-03fd-49d7-98d3-5a0e0affd2f5.tmp
    C:\WINDOWS\Temp\bd42ab78-2840-4eb2-b2bd-ed1991a0bd7d.tmp
    C:\WINDOWS\Temp\be0e76a6-887c-45ae-9918-06667b8f8580.tmp
    C:\WINDOWS\Temp\c3989d32-f6d4-4ef5-909f-40a02942cdd8.tmp
    C:\WINDOWS\Temp\c4758b7a-0492-46ec-b529-0f8b8092fa96.tmp
    C:\WINDOWS\Temp\c643063e-839d-4f73-baae-e9a79019a2c7.tmp
    C:\WINDOWS\Temp\c920d344-4a5a-4f4f-86d0-121d781f705f.tmp
    C:\WINDOWS\Temp\cec735cc-911a-428e-b23c-2b6dab50f056.tmp
    C:\WINDOWS\Temp\d794b1d3-af42-4380-bb25-c6b52314c1a9.tmp
    C:\WINDOWS\Temp\df6ba0e4-213f-44fa-8abf-5ff1968a39f8.tmp
    C:\WINDOWS\Temp\e7c5fb5b-e43f-466b-b395-ac6103c9a5f7.tmp
    C:\WINDOWS\temp\33493c30-9c72-4f8c-8ae0-1f080fa703f4.tmp
    C:\WINDOWS\temp\746cca8a-ae49-42dc-803c-bf02c6ff369d.tmp
    C:\WINDOWS\temp\af286232-fae6-45f0-8c14-972accc66743.tmp
    C:\WINDOWS\temp\82eaecab-cc39-4083-9432-989ba24a4dc2.tmp
    C:\WINDOWS\temp\fd35f376-eb05-474f-b46d-78de47ad4804.tmp
    C:\WINDOWS\Temp\eaf7bfcf-dda7-4b37-a48e-b153ba4d31dd.tmp
    C:\WINDOWS\Temp\f4c94ea1-3060-46ff-a417-8519f21c2f33.tmp
    C:\WINDOWS\Temp\f97a5afd-0120-4cfe-9ea9-f14b5cc0fa87.tmp
    C:\WINDOWS\Temp\fdf6929a-9d30-4f5c-a661-153fa6b1fd42.tmp
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the prvevious file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    [​IMG]
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  12. edbo20

    edbo20 Corporal

    Let's hope this did it. thank you.
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It did do it...and I apologize for not getting you fixed up sooner.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real-time protection. They are useful as backup scanners.They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  14. edbo20

    edbo20 Corporal

    No problems. Thanks for your help.

    I hope your work in this forum pays off in some way for you folks. It's the best around and I know you guys are busy.
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome....safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds