Ramnit.A?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Yetiboy, Oct 14, 2010.

  1. Yetiboy

    Yetiboy Private E-2

    Hi,

    These were my original two posts that I made on another forum :


    [quote name='Yetiboy' date='Oct 13 2010, 09:05 AM' post='1972627']
    AVG has been finding so much stuff in the past few days. At first it was Cryptic and Generic trojans. I nuked it all, ran MBAM in safe mode and was happy. Then a few days later much of the same stuff pops up again, including SHeur3 stuff. I nuked it all again last night, ran Kaspersky and was satisfied that I had got rid of it all.

    Now today everything seems ok, I decide to run Kaspersky again. As it's running AVG pops up again.

    There are 4 threats mentioned, though it seems like the same two files listed twice :

    c:\Users\Jon\AppData\Local\Temp\csenxmwroa.exe
    c:\Documents and Settings\Jon\AppData\Local\Temp\csenxmwroa.exe
    c:\Users\Jon\AppData\Local\Temp\swemxorcna.exe
    c\Documents and Settings\Users\Jon\AppData\Local\Temp\swemxorcna.exe

    These look familiar and I'm sure I've attempted to nuke them at least once or twice with AVG in the past few days, but they were definitely not listed as 'Generic19.AZMG' at that time. Google yields nothing on either filename. Are these false positives?

    What do I do? Thanks, and apologies for the lack of details in some areas. Oh and I have Windows 7 Home Premium.

    edit - sorry I misspoke in the thread title. As I alluded to earlier, AVG was reporting it as 'Trojan Horse Generic19.AZMG'.
    [/quote]


    [quote name='Yetiboy' date='Oct 13 2010, 09:14 AM' post='1972646']
    More information :

    I just opened the Virus Vault in AVG. There were a LOT of mentions from the past few days of htm files coming us as 'VBS/Generic'. Most were in the IE Temporary Internet files. I don't use Internet Explorer. I assume all of these are nothing to worry about? Anyway it seems the filenames I listed in the above post were very very similar to the ones being reported as other stuff in the past few days :

    [​IMG]
    [/quote]




    The first guy had me run a couple of tests. I did but before he replied again a second guy identified Win32/Zbot in the screenshot as Ramnit.A and stated :

    "Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed."

    The thread is here fwiw (I am assuming it is ok to link to other forums).




    From reading around on this forum it seems the advice is usually less severe, and it seems that if Ramnit is stopped early you can be ok with no need to format.

    My problems with formatting are :

    - I don't have a Windows disc (stupid Samsung laptop, I think I was supposed to create one but I didn't, all I have is this backup stuff on the D drive which I wouldn't want to use).

    - Lots of photos etc that I'd like to keep

    Having said that, security is important to me and I frequently access various online accounts containing money. If there's a chance I'm still infected I'll have to bite the bullet. I'd really like to see what everyone has to say.

    My scans are all running clear at the moment, and seem to have been doing since I cleared the temp files using TFC.

    I have done the required tests and included the logs in this post, however RootRepeal would not work for me. I also just ran the online ESET scan, and nothing came up. After I hit reply on this I'm going to restart and run it twice back to back, but I fear nothing more will come up.

    Sorry for being so wordy and thanks for all your help.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you are receiving help in another forum, you should stick with them. Otherwise it is a waste of either their or my time. If you want to say with us, then you need to start doing an online eSet scan. Back to back scans and save each log. I would like to see the first three scan logs:

    eSet Online Scan.
     
  3. Yetiboy

    Yetiboy Private E-2

    Well I'd like to stay with you then.

    I have just run ESET three times. There is nothing coming up whatsoever, and as such, I don't believe there are any logs?

    It seems every program I run reports clean stuff right now. I guess my question is simply 'is there a chance I am still infected?'

    Thanks for the reply.
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your logs are clean and if eSet is coming back clean, then I think you are good to go.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Support MajorGeeks with Geek Wear!
     
  5. Yetiboy

    Yetiboy Private E-2

    Ok. Thanks for the diagnosis Tim, i'll get on that right now. Much appreciated.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are quite welcome. Glad you missed the bullet!! Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds