Symantec found Trojan.Gen

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by bonecrush, Oct 7, 2013.

  1. bonecrush

    bonecrush Private E-2

    Symantec found the Trojan.Gen virus on my laptop. Symantec will not clean the virus permanently. It is on an XP system. I have attached the necessary logs.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please re run Hitman and have it delete Potential Unwanted Programs.




    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [RUN][SUSP PATH] HKCU\[...]\Run : Unzozo ("C:\Documents and Settings\jshackett.RTG-TEXAS\Application Data\Ynty\unzozo.exe
    • [RUN][SUSP PATH] HKCU\[...]\Run : kixearassuxv (C:\Documents and Settings\jshackett.RTG-TEXAS\kixearassuxv.exe
    • [RUN][SUSP PATH] HKCU\[...]\Run : AS2014 (C:\Documents and Settings\All Users\Application Data\X9naaU33\X9naaU33.exe
    • [RUN][SUSP PATH] HKUS\S-1-5-21-1013663332-3773469416-1464603408-1178\[...]\Run : Unzozo ("C:\Documents and Settings\jshackett.RTG-TEXAS\Application Data\Ynty\unzozo.exe
    • [RUN][SUSP PATH] HKUS\S-1-5-21-1013663332-3773469416-1464603408-1178\[...]\Run : kixearassuxv (C:\Documents and Settings\jshackett.RTG-TEXAS\kixearassuxv.exe
    • [RUN][SUSP PATH] HKUS\S-1-5-21-1013663332-3773469416-1464603408-1178\[...]\Run : AS2014 (C:\Documents and Settings\All Users\Application Data\X9naaU33\X9naaU33.exe
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.





    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1:9421;<local>;*.local
    • O4 - HKCU\..\Run: [Unzozo] "C:\Documents and Settings\jshackett.RTG-TEXAS\Application Data\Ynty\unzozo.exe"
    • O4 - HKCU\..\Run: [kixearassuxv] C:\Documents and Settings\jshackett.RTG-TEXAS\kixearassuxv.exe
    After clicking Fix exit HJT.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Unzozo"=-
    "kixearassuxv"=-
    
    :files
    C:\Documents and Settings\All Users\Application Data\Babylon
    C:\Documents and Settings\All Users\Application Data\BrowserDefender
    C:\Documents and Settings\All Users\Application Data\X9naaU33\X9naaU33.exe
    C:\Documents and Settings\All Users\Application Data\X9naaU33
    C:\Documents and Settings\jshackett.RTG-TEXAS\kixearassuxv.exe 
    C:\Documents and Settings\jshackett.RTG-TEXAS\Application Data\Ynty\unzozo.exe
    C:\Documents and Settings\jshackett.RTG-TEXAS\Application Data\Ynty
    C:\Documents and Settings\jshackett.RTG-TEXAS\Start Menu\Programs\Antivirus Security Pro
    C:\WINDOWS\x
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. bonecrush

    bonecrush Private E-2

    Attached are the logs you requested. In some instances, items that needed to be check, and deleted, were not found in the scan. I also have two logs from roguekiller. I assume one is pre and the other is post.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    And describe to me how the machine is running now at this point, please. :)
     
  5. bonecrush

    bonecrush Private E-2

    The virus/malware usually shows up in the morning, following the user's log in. I will observe the machine and reply back.
     
  6. bonecrush

    bonecrush Private E-2

    Symantec found Trojan.Gen again this morning after the user logged in. What will be our next step?
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You need to attach the log showing exactly what it finds and where it finds it please.
     
  8. bonecrush

    bonecrush Private E-2

    Which tool should I use? RogueKiller, MGTools, etc?
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Symantec finds it, so I'm asking can you either attach a log showing me what it finds or just write down the file path and the "threat" yourself so I can see?
     
  10. bonecrush

    bonecrush Private E-2

    Attached is a csv export, from Symantec, of the risk log.
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please give CCleaner a run (not the reg scanner - just the cleaner itself) then rescan with your antivirus and let me know if it still continues to detect the temp files.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds