Symantec Endpoint Protection: HTTP Infostealer Snifula.B Activity detected

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by pplucky, Jun 20, 2010.

  1. pplucky

    pplucky Private E-2

    Hi there.

    I'm using Windows 7 and Symantec Endpoint Protection, both updated and I've been getting messages like this:
    [SID: 22172] HTTP Infostealer Snifula.B Activity detected.
    Traffic has been blocked from this application: D:\PortableApps\xxFirefoxPortablexx\App\Firefox\firefox.exe

    everytime I connect to the internet with Firefox.

    Besides that, sometimes I also get a message like this:
    Denial of Service "UDP Flood Attack" attack detected.
    Description:
    An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.

    I ran Malwarebytes' Anti-Malware, SuperAntiSpyware and ComboFix, but I couldn't run RootRepeal or MGTools.

    With RootRepeal, I get an error message.

    With MGTools, when I execute GetLogs.Bat as an administrator, nothing happens...

    All logs are attached to this message.

    Can anyone help me please?

    Thanks and best regards
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Important Notice: A new version of SUPERAntiSpyware is available.
    • Please uninstall your current version (this is necessary).
    • Then download this SUPERAntiSpyware
    • Install this new version. It may tell you that you need to reboot to complete the installation. You must reboot at this time.
    • After the reboot, run SUPERAntiSpyware and immediately click the Check for Updates button to get more updates for the database.
    • Now run a new full scan of your system. And attach this log later.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    c:\windows\system32\MpSitend.dll.vir
    c:\windows\system32\MpSitend.dll
    c:\windows\system32\Fxxplfnt.tmp
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now rename MGTools.exe to Kestrel.com and then try and run it again, preferably in normal mode, but in safe mode if you have issues running in normal mode.

    Attach the C:\Mglogs.zip if successful, we really need to see those logs in order to provide you with a complete fix. Also attach the new log from running the updated version of SAS.
     
  3. pplucky

    pplucky Private E-2

    Hi Kestrel13!

    I did as you requested and I attached the logs for SAS and MGTools.

    I also attached the Combofix log from today, in case you need it.

    Do you anything else from me?

    Thanks and best regards.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let's try again:

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    File::
    c:\windows\system32\MpSitend.dll
    c:\windows\system32\Fxxplfnt.tmp
    Registry::
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager\appcertdlls]
    "diskfpmp"=-
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  5. pplucky

    pplucky Private E-2

    Hello Kestrel13!

    Just did as you mentioned and the logs are attached.

    I tried renaming files MpSitend.dll and Fxxplfnt.tmp both in c:\windows\system32\ and the second one appeared again afterwards (meaning something else is still there for sure). Still, it seems the messages from Symantec saying 'Symantec Endpoint Protection: HTTP Infostealer Snifula.B Activity detected' have disappeared after that...

    Still, the Denial of Service messages still appear...
    Denial of Service "UDP Flood Attack" attack detected.
    Description:
    An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.

    and then
    Traffic from IP address 192.168.1.1 is blocked from 25-06-2010 19:53:47 to 25-06-2010 20:03:47.

    Still, before running the tools as you requested, I renamed the files back to the original names, so that this wouldn't interfere with your analysis.

    Thanks in advance for all your help.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let's do this and then see how things are running.


    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    If you are not set up to use the following proxy then please include this in our fixables below.

    After clicking Fix exit HJT.

    Also delete all files in the below folder except ones from the current date (Windows will not let you delete the files from the current day).

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  7. pplucky

    pplucky Private E-2

    Hello

    Here it is the new log. I did not select the proxy line as this is configured by me to be used in IE, if necessary.

    Thanks and best regards.


    FYI, I changed my Wireless WPA key and it looks like I'm not anymore getting the Denial of Service errors... Does it make sense to you? What could be causing those errors?

    The .tmp file above mentioned still exists in C:\Windows\System32, although the .dll disappeared now. Should I delete the first manually?
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am not sure.
    Let's try it this way first.

    Now download The Avenger by Swandog469, and save it to your Desktop.

    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now use windows explorer to see if the file really was deleted by avenger or not. If not, then you can try renaming it to Fxxplfnt.tmp.old delete it yourself manually, reboot, and again check for the file's presence.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  9. pplucky

    pplucky Private E-2

    Hello.

    I just did what you requested with avenger.exe and the file C:\Windows\System32\Fxxplfnt.tmp disappeared.

    Still, it is strange because I had already deleted it manually and it appeared again. Now it was deleted, let's see if it comes back again. What is the origin of this file, do you have any idea?

    I attached the new MGlogs.

    Thanks again
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    C:\Windows\system32\wocaffe <--- What is inside of this directory? I suspect it is legit but I want to be sure.

    Also delete all files in the below bold folders except ones from the current date (Windows will not let you delete the files from the current day).
    Let me know about that folder, and very soon I will be giving you final steps. :)
     
  11. pplucky

    pplucky Private E-2

    Hello.

    First of all, I would like to let you know that file C:\Windows\System32\Fxxplfnt.tmp appeared again.

    In second place, my DoS attacks are still occurring as mentioned before.

    Here it is the contents of the directory you mentioned:

    Directory of C:\Windows\System32\wocaffe

    27-05-2010 13:04 <DIR> .
    27-05-2010 13:04 <DIR> ..
    15-06-2010 15:18 <DIR> dmjadafq
    0 File(s) 0 bytes

    Directory of C:\Windows\System32\wocaffe\dmjadafq

    15-06-2010 15:18 <DIR> .
    15-06-2010 15:18 <DIR> ..
    15-06-2010 15:20 2.640 Truesuite.eds
    16-06-2010 10:35 74 TrueSuite.Size.ini
    2 File(s) 2.714 bytes

    Thanks in advance.
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Stubborn huh?

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.

    Code:
    :Files
    C:\Windows\system32\wocaffe 
    C:\Windows\System32\Fxxplfnt.tmp
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

    Now run this:

    GMER - running with a random name

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  13. pplucky

    pplucky Private E-2

    Hello Kestrel13!

    Stubborn to say the least... :cry
    The Denial of Service messages are appearing all the time (and consequently Internet is being blocked by Symantec as a preventive measure).

    I did exactly what you proposed and attached the corresponding logs to this post.

    Thanks a lot for all & your patience.
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Uninstall/delete all other copies of any form of FireFox. ( we are deleting D:\PortableApps\xxFirefoxPortablexx\App\Firefox\firefox.exe with combofix) Reinstall only after verifying that Symantec is not complaining about FireFox files anymore.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    File::
    D:\PortableApps\xxFirefoxPortablexx\App\Firefox\firefox.exe
    
    DirLook::
    c:\windows\system32\x64
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Remember incoming blocking is what a firewall is supposed to do.
     
  15. pplucky

    pplucky Private E-2

    I did what you requested and I attach the new logs to the post.

    I don't if I understand, because Symantec does not complain about Firefox files... only about DoS attacks. What do you mean?

    I know, but before all this started, I was not receiving these messages; what worries me is what may be enabling these attacks...
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I mean this statement you made:


    Reviewing your logs now.
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Have you now reinstalled FireFox? ( I am assuming you are not having problems with IE ). What is on your D: drive? Is this a partition on your hard drive or a thumb drive?
     
    Last edited: Jul 10, 2010
  18. pplucky

    pplucky Private E-2

    Hello.

    No, I did not reinstall Firefox again. I'm using Google Chrome in the meanwhile, but the messages for the DoS still appear. I suppose they also appear for IE, but I'm not sure.

    D: is a partition on my hard drive.

    Thanks
     
  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Re-run MBAM again and this time do a complete scan ( not a quick scan ) and include the D: partition in the scan. Let's see what that finds.

    Also, what is symantec now reporting as the source of these attacks?

    Have you also checked your router settings for any changes?
     
  20. pplucky

    pplucky Private E-2

    Hello TimW.

    I updated and ran MBAM again as you suggested and I attached the log.

    Symantec is always reporting that the attacks are coming from 192.168.1.1, which is my router's internal address in my network.

    I already tried putting the router's settings to default and then configure it again to my settings, but it still happens.

    I just created an IP filter in the router to block UDP packets to ports 1035, 1040, 1063, 1068 and 1900 from IP 192.168.1.1 to any computer in the network, as this was reported as being scanned by IP address 192.168.1.1. Let's see if it helps.

    Another strange thing is that if I connect another pc to my network (which is not the original one infected with Malware), sometimes I also get these messages! Do you think it is possible that my router or my modem have been compromised?

    Thanks a lot for all your help.
     

    Attached Files:

  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, I do. So to check, I would bypass the router and see if the problem still persists. If it does, then you may need to contact your ISP to get a new modem. If it stops, then some setting in your router is causing the problem. I would just reset it to factory settings first and see if it continues, as a trouble shooting method.
     
  22. pplucky

    pplucky Private E-2

    Hello TimW.

    I have a separate router + modem setup. Modem connected to ISP, then bridged to router and Internet is distributed by the router (cable and wirelessly).

    I already defaulted the settings for the router and even updated its firmware to a newer one. I also changed some firmware settings for the router, but the problem still happens.

    I will try to unbridge the modem from the router and configure it to have the ISP internet access settings (which now are in the router). If the problem still occurs, the problem should be on the modem side...

    After that, and if the problem appears, I will try to default the modem settings and see if it works...

    Strangest thing is that I still have file 'c:\windows\system32\Fxxplfnt.tmp' appearing by itself (and it only happens in the infected laptop, not in others). Any idea why?

    Thanks a lot
     
  23. pplucky

    pplucky Private E-2

    Hello.

    I could isolate the problem: it is in the router, as connected directly to the modem I don't have these problems!

    Any idea why this may happen and how to fix it? I already formatted my laptop, restored default factory settings in the router, re-installed official Asus firmware and then router settings done manually (no load of previously saved configuration file).

    After that, just by connecting a laptop via Wifi to the router (totally disconnected from the internet), I got the message 'Somebody is scanning your computer. Your computer's UDP ports: 5353, 1036, 1041, 1900 and 137 have been scanned from 192.168.1.1' (being that the port numbers could change). If I connected the same laptop to the same router, but through LAN cable, it didn't happen.

    Any ideas are welcome.

    Thanks in advance and best regards
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    192.168.1.1 is the IP of one of your other computers, I believe. You can get me a new MGLogs.zip to check your IP settings. But it is not something to be concerned with.
     
  25. pplucky

    pplucky Private E-2

    192.168.1.1 is the internal IP address for my router. But what can be causing the router to scan ports in my laptop(s)?

    Thanks in advance.
     
  26. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I can't answer that. Perhaps you should ask that in the networking forum. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds